Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
In the implementation of subdivision scheme, three of the most important issues are smoothness, size of support, and approximation order. Our objective is to introduce an improved...
Backward beam search for dependency analysis of Japanese is proposed. As dependencies normally go from left to right in Japanese, it is effective to analyze sentences backwards (f...