The need of formal verification is a problem that involves all the fields in which sensible data are managed. In this context the verification of data streams became a fundamental...
We describe a method to extract tabular data from web pages. Rather than just analyzing the DOM tree, we also exploit visual cues in the rendered version of the document to extrac...
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
Abstract—It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, conï...
This paper describes the use of the Virtual Reality Modeling Language (VRML) in the VIM - Visual Interface to Manufacturing system. The VIM prototype demonstrates the technical fe...
Sandy Ressler, Qiming Wang, Scott Bodarky, Charles...