A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Software product lines (PLs) present a solid approach in large scale reuse. Due to the PLs’ inherit complexity, many PL methods use the notion of ”features” to support requir...
There have been recent improvements in document technologies like the standardization of object interfaces to access and manipulate the properties of web documents. There has also...
For the transition from traditional to digital libraries, the large number of handwritten manuscripts that exist pose a great challenge. Easy access to such collections requires a...
When identifying a writer from a handwritten text, most often, either some characteristic patterns or some shape parameters are extracted. They are assumed to be specific of the w...