Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
We present an algorithm that takes an unannotated corpus as its input, and returns a ranked list of probable morphologically related pairs as its output. The algorithm tries to di...
Tertiary institutions in South Africa are faced with dealing with diversity in all its forms in our classrooms. Information Systems, Information Technology and Computer Science st...
AbstractAbstractAbstractAbstract This paper takes a critical look at electronic markets. Through an examination of Hong Kong’s air cargo industry, where an electronic network rec...