Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
Abstract. We propose and formalize HomeBPEL, a higher-order WSBPEL-like business process execution language where processes are firstclass values that can be stored in variables, p...
Mikkel Bundgaard, Arne J. Glenstrup, Thomas T. Hil...
Yawat1 is a tool for the visualization and manipulation of word- and phrase-level alignments of parallel text. Unlike most other tools for manual word alignment, it relies on dyna...
We present a novel randomized approach to the graph isomorphism problem. Our algorithm aims at solving difficult instances by producing randomized certificates for non-isomorphis...
Accurate noise level estimation is essential to assure good performance of noise reduction filters. Noise contaminating raw images is typically modeled as additive white and Gauss...
Angelo Bosco, Arcangelo Bruna, D. Giacalone, Sebas...