Compile-time type information should be valuable in efficient compilation of statically typed functional languages such as Standard ML. But how should type-directed compilation w...
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
The Grid paradigm of accessing heterogeneous distributed resources proved to be extremely effective, as many organizations are relying on Grid middlewares for their computational ...
Paolo Andreetto, Sergio Andreozzi, Antonia Ghisell...
— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Nowadays, several health institutions already use clinical report systems. However the majority of these systems do not comply with any standard for codification, storage and tran...
Mariana Kessler Bortoluzzi, Aldo von Wangenheim, K...