There is an increasing interest in using P2P as a basis for software systems. However, by their very nature, achieving dependability within a P2P system can be difficult. This pap...
This paper formalizes the folklore result that strongly-typed applets are more secure than untyped ones. We formulate and prove several security properties that all well-typed app...
We present a new algorithm to compute the head motion between two views from the correspondences of five feature points (eye corners, mouth corners, and nose top), and zero or mor...
Drawing on a growing database of systematic relationships between word-senses, the authors argue that a significant class of these represent Lexical Implication Rules, a set of fo...
: The size and complexity of software systems are continuously increasing, which makes them difficult and labor-intensive to develop, test and evolve. Since concurrent systems are ...