Abstract. Erasure of information incurs an increase in entropy and dissipates heat. Therefore, information-preserving computation is essential for constructing computers that use e...
This paper presents a novel source code transformation for control flow optimizationcalled loop nest splitting which minimizes the number of executed if-statements in loop nests ...
We discuss a rigorous unifying framework for both planning and replanning, extending an existing logic-based approach to resource-based planning. The primitive concepts in this Ac...
Roman van der Krogt, Mathijs de Weerdt, Cees Witte...
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...