Considering that 80 genomes have been sequenced, providing us with the static information of the genome, it is still a long way to reveal the relationship between complex genotype...
This paper provides one more step towards bridging the gap between the formal and computational approaches to the verification of cryptographic protocols. We extend the well-known ...
In this paper we consider two descriptions in Maude of the leader election protocol from the IEEE 1394 serial multimedia bus. Particularly, the time aspects of the protocol are st...
One of the ways to model contraction functions for belief sets is epistemic entrenchment. The first step was provided by G¨ardenfors in [5], who defined epistemic entrenchment ...
We present in this communication a new biometric system based on the use of hand veins acquired by an infrared imager. After the preprocessing stage and binarization, the vein imag...