Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
The quality of ultrasound based diagnosis highly depends on the operator’s skills. Some healthcare centres may not have the required medical experts on hand when needed and there...
Adriana Vilchis Gonzales, Philippe Cinquin, Jocely...
In this paper we propose a new operator for advanced exploration of large multidimensional databases. The proposed operator can automatically generalize from a specific problem c...
This paper describes an agent-based approach to realizing interactive pedagogical drama. Characters choose their actions autonomously, while director and cinematographer agents ma...
Stacy Marsella, W. Lewis Johnson, Catherine LaBore