The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Interface-based programming, i.e. the systematic use of interface types in variable declarations, serves the decoupling of classes and increases a program’s changeability. To ma...
When human tutors engage in dialogue, they freely exploit allaspects of the mutually known context, including the previous discourse. Utterances that do not draw on previous disco...
Background: The Golden Spike data set has been used to validate a number of methods for summarizing Affymetrix data sets, sometimes with seemingly contradictory results. Much less...
In order to deal with infinite regular trees (or other pointed graph structures) efficiently, we give new algorithms to store such structures. The trees are stored in such a way th...