We study proof systems for reasoning about logical consequences and refinement of structured specifications, based on similar systems proposed earlier in the literature [ST 88, Wi...
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
This paper deals with content-based image retrieval. When the user is looking for large categories, statistical classification techniques are efficient as soon as the training se...
Matthieu Cord, Philippe Henri Gosselin, Sylvie Phi...
This paper presents the experimental observation of the degradation in asymmetric sampled grating DFB lasers by the accelerated life tests. Two degradation phenomena related to th...