Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
In order to combine hypertext with database facilities, we show how to extract an effective storage structure from given instance relationships. The schema of the structure recogn...
The evolution of SAT technology over the last decade has motivated its application in model checking, initially through the utilization of SAT in bounded model checking (BMC) and, ...
The self-organizing map SOM is widely used as a data visualization method in various engineering applications. It performs a non-linear mapping from a high-dimensional data spac...
Abstract. This paper deals with the parallel raytracing part of virtualreality system PROLAND, developed at the home institution of authors. It describes an actual implementation o...