This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Temporal reasoners for document understanding typically assume that a document’s creation date is known. Algorithms to ground relative time expressions and order events often re...
This paper presents a model for describing the synchronization between several media delivered over a network in a Web-based environment. Synchronization concerns the download and...
Group work frequently involves transitions between periods of active collaboration and periods of individual activity. We aim to support this typical work practice by introducing ...