Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...