In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behaviour of a distributed program in an environment where ...
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this pape...
Abstract. We present a reflection on the evolution of the different methods for constructing minimal deterministic acyclic finite-state automata from a finite set of words. We ...
This paper presents work conducted towards the development of an effective software engineering-based methodology for integrity control in the process of spreadsheet development. ...
Kamalasen Rajalingham, David Chadwick, Brian Knigh...
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...