This paper discusses our rationale for teaching the fundamentals of computer architecture early in the computer science (CS) degree program. We also describe an active learning te...
We investigate a certain quartic integral from V. Moll's book "Irresistible Integrals" and demonstrate how it can be solved by computer algebra methods, namely by u...
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
This paper presents the works done by several research groups from University of Extremadura and CETA-CIEMAT (Centro Extreme˜no de Tecnolog´ıas Avanzadas) in order to deploy an ...