New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
Custodians of digital content take action when the material that they are responsible for is threatened by, for example, obsolescence or deterioration. At first glance, ideal prese...
Kohn’s Molecular Interaction Maps (MIMs) are a graphical notation for describing bioregulatory networks at the molecular level. Even if the meaning of Kohn’s diagrams can be of...
Roberto Barbuti, Daniela Lepri, Andrea Maggiolo-Sc...
In this paper we present an O(n log n) algorithm for finding a maximum flow in a directed planar graph, where the vertices are subject to capacity constraints, in addition to the...
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . , m − 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ...
Djamal Belazzougui, Fabiano C. Botelho, Martin Die...