Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
: This paper introduces a visual interface for computer-supported cooperative work (CSCW). The interface is an extension of the editor interface of ESCHER, a prototype database sys...
Lutz Michael Wegner, Manfred Paul 0002, Jens Thamm...
Players perceive information about game environments through a virtual camera. While a significant discussion in the industry and in academic research circles has centered around ...
Arnav Jhala, Martin Schwartz, Hector Perez Martine...
Nowadays many urban areas have been equipped with networks of surveillance cameras, which can be used for automatic localization and tracking of people. However, given the large r...