We present a complete, exact and efficient implementation to compute the adjacency graph of an arrangement of quadrics, i.e. surfaces of algebraic degree 2. This is a major step t...
Laurent Dupont, Michael Hemmer, Sylvain Petitjean,...
This paper reports on an effort to increase the reliability of JavaCard-based smart cards by means of formal specification and verification of JavaCard source code. As a first ste...
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
We have spelling and grammar checking tools available on today's word processors. But what they are missing is a tool that can recommend several possibilities of a given writ...
Fahim Kawsar, Shaikh Mostafa Al Masum, Mitsuru Ish...
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...