Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Two main aspects of Partial Evaluation for Prolog programs are considered: treatment of cuts and control of recursion. The analysis about cut is exhaustive: we consider occurrence...
In software product line engineering, feature models enable to automate the generation of productspecific models in conjunction with domain “base models” (e.g. UML models). T...
Germain Saval, Jorge Pinna Puissant, Patrick Heyma...
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
We present the results of experiments using terms from citations for scientific literature search. To index a given document, we use terms used by citing documents to describe that...