The IAGO Project explores the question of whether a software model, in the form of a computational model of cognitive behavior, can contribute to better anticipation of asymmetric...
Most languages used for developing web services and clients exhibit properties which make calling remote functions across a network a non-trivial task. The type systems used by ob...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
Ubiquitous environments facilitate the fast and easy access to users’ physical environments. Ubiquitous environments typically capture users’ presence and activities in a room...
Tom Gross, Thilo Paul-Stueve, Tsvetomira Palakarsk...
Abstract. In this paper, a novel architecture dedicated to image processing is presented. The most original aspect of the approach is the use of a System On Chip implemented in a F...
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...