A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Abstract. In industry, many business processes are modelled and stored in Enterprise Information Systems (EIS). Tools supporting the verification and validation of business process...
Ivo Raedts, Marija Petkovic, Yaroslav S. Usenko, J...
Multi-pixel encoding is an emerging method in visual cryptography for that it can encode more than one pixel for each encoding run. Nevertheless, in fact its encoding efficiency is...
We develop a novel method for class-based feature matching across large changes in viewing conditions. The method (called MBE) is based on the property that when objects share a si...
The interest of epistemic comparative conditionals comes from the fact that they represent genuine `comparative epistemic relations' between propositions, situations, evidence...