Recently, there has been much interest in enhancing purely combinatorial formalisms with numerical information. For example, planning formalisms can be enriched by taking resource...
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
This paper presents an exploration algorithm which examines execution time and energy consumption of a given application, while considering a parameterized memory architecture. Th...
Radoslaw Szymanek, Francky Catthoor, Krzysztof Kuc...
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
This paper describes a method for developing a transform between two device CMYK spaces in a way that preserves information about the black separation. An important application of...