Test sets that detect each target fault n times (n-detection test sets) are typically generated for restricted values of n due to the increase in test set size with n. We perform ...
Peer-to-Peer protocols and applications have drawn much attention. Freenet is a groundbreaking Peer-to-Peer system that protects the anonymity of information producers, consumers,...
Jens Mache, Eric Anholt, Valentina Grigoreanu, Tim...
Checking if microprocessor cores are fully functional at the end of the productive process has become a major issue. Traditional functional approaches are not sufficient when cons...
This paper presents a method for accurately segmenting moving container trucks in image sequences. This task allows to increase the performance of a recognition system that must id...
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...