Binary Decision Diagrams (BDDs) often fail to exploit sharing between Boolean functions that differ only in their support variables. In a memory circuit, for example, the function...
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
In dynamic environments with frequent content updates, we require online full-text search that scales to large data collections and achieves low search latency. Several recent met...
Requirement traceability is intended to ensure continued alignment between stakeholders’ requirements and various outputs of the system development process. Therefore a process f...
Rosa Candida Pinto, Carla T. L. L. Silva, Jaelson ...