Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
One of the most important steps towards effective software maintenance of a large complicated system is to understand how program features are spread over the entire system and th...
W. Eric Wong, Swapna S. Gokhale, Joseph Robert Hor...
The traditional representation of a program is as a linear sequence of text. At some stage in the execution sequence the source text is checked for type correctness and its transla...
Ronald Morrison, Richard C. H. Connor, Quintin I. ...
Many settings of unsupervised learning can be viewed as quantization problems — the minimization of the expected quantization error subject to some restrictions. This allows the ...
Alex J. Smola, Robert C. Williamson, Sebastian Mik...
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...