Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
We present a geometric model and a computational method for segmentation of images with missing boundaries. In many situations, the human visual system fills in missing gaps in ed...
Abstract--In mobile networks, the traffic fluctuation is unpredictable due to mobility and varying resource requirement of multimedia applications. Hence, it is essential to mainta...
Abstract. This paper identifies a new physical correlate of finger pressure that can be detected and measured visually in a wide variety of situations. When a human finger is press...
Joe Marshall, Tony P. Pridmore, Mike Pound, Steve ...