Abstract. The first part of this paper presents a new approach for automatically proving nontermination of string rewrite systems. We encode rewrite sequences as propositional for...
Harald Zankl, Christian Sternagel, Dieter Hofbauer...
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Many algorithms on data structures such as terms (finitely branching trees) are naturally implemented by second-order recursion: A first-order procedure f passes itself as an arg...
A human-powered user interface device sources its power from the physical effort required to operate it. This paper describes a technique by which a geared DC motor and a simple c...
This paper outlines a series of experiments looking at the annotation and subsequent analysis of skills-based learning and teaching in the domain of Nursing. The experiments used ...
Mark J. Weal, Danius T. Michaelides, Kevin R. Page...