—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Most common network protocols (e.g., the Internet Protocol) work with variable size packets, whereas contemporary switches still operate with fixed size cells, which are easier t...
Resolving local ambiguities is an important issue for shape from shading (SFS). Pixel ambiguities of SFS can be eliminated by propagation approaches. However, patch ambiguities st...
Abstract. Explanation and argumentation are fundamental to reasoning. They are therefore of some importance to artificial intelligence. Discourse-based reasoning (DBR) is a knowled...