raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
Visual attention is a complex concept that includes many processes to find the region of concentration in a visual scene. In this paper, we discuss a spatio-temporal visual salien...
In this paper we present an interactive method for simulating deformable objects using skeletal constraints. We introduce a two-way coupling of a finite element model and a skelet...
Joachim Georgii, Daniel Lagler, Christian Dick, R&...
Abstract— Given a wireless ad hoc network and an endto-end traffic pattern, the power rate function refers to the minimum total power required to support different throughput un...