Abstract. Hoare logic is widely used for software specification and verification. Frequently we need to prove the total correctness of a program: to prove that the program not only...
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as ...
As XML has evolved from a document markup language to a widely-used format for exchange of structured and semistructured data, managing large amounts of XML data has become increa...
Michael Rys, Donald D. Chamberlin, Daniela Floresc...
In this paper, we will show how non-photorealistic rendering (NPR) can take a new role in content-based image retrieval (CBIR). We propose a content-based image retrieval method. ...
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...