We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Abstract. We present new careful semantics within Dung’s theory of argumentation. Under such careful semantics, two arguments cannot belong to the same extension whenever one of ...
Sylvie Coste-Marquis, Caroline Devred, Pierre Marq...
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....