Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
An armada of emerging agile methods of software development (with eXtreme Programming and Scrum being the most broadly used) is both gaining popularity and generating lots of cont...
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Abstract. The clause linking technique of Lee and Plaisted proves the unsatisfiability of a set of first-order clauses by generating a sufficiently large set of instances of thes...
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...