In this paper, we present a proof that the bitonic sort is sound using PVS, a powerful specification and verification environment. First, we briefly introduce this well-known para...
Models of software systems are built in Z and VDM using partial functions between sets and certain operations on these partial functions : extension ( ), restriction ( ), removal ...
ABSTRACT This paper builds on an existing model of human-computer interaction that focuses on the information structures employed as distributed information resources by users in d...
A new algorithm is presented which approximates the perceived visual similarity between images. The images are initially transformed into a feature space which captures visual str...
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower...