Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
Cooperation in information retrieval contexts can be used to share query results inside groups of individuals with common objectives, provided that all of them are aware of each ot...
Tracheoesophageal (TE) speech is a possibility to restore the ability to speak after laryngectomy, i.e. the removal of the larynx. TE speech often shows low audibility and intellig...
An increasing percentage of the data needed by business applications is being generated in XML format. Storing the XML in its native format will facilitate new applications that e...
Alan Halverson, Vanja Josifovski, Guy M. Lohman, H...
In this paper a new method for the non-invasive adaptation of user interfaces is presented. The main idea is not to implement the user interface toolkit as an API, but instead as ...
Dirc Rose, Simon Stegmaier, Guido Reina, Daniel We...