We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
The paper presents a Design Space Exploration (DSE) experiment which has been carried out in order to determine the optimum FPGA–based Variable-Length Decoder (VLD) computing re...
Mihai Sima, Sorin Cotofana, Stamatis Vassiliadis, ...
We present ongoing work on a project for automatic recognition of spontaneous facial actions. Spontaneous facial expressions differ substantially from posed expressions, similar t...
Bjorn Braathen, Marian Stewart Bartlett, Gwen Litt...
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...