Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
An alternative method to H.263 for encoding of moving images at bit rates below 64 kbit/s is presented using adaptive spatial subsampling, mesh based interpolation and node tracki...
It is widely recognized today that the management of imprecision and vagueness will yield more intelligent and realistic knowledge-based applications. Description Logics (DLs) are...
Giorgos Stoilos, Giorgos B. Stamou, Jeff Z. Pan, V...
There is a growing consensus that crosscutting concerns harm code quality. An example of a crosscutting concern is a functional requirement whose implementation is distributed acro...
Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood,...
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...