Many processes can be seen as transformations of tree-like data structures. In compiler construction, for example, we continuously manipulate trees and perform tree transformations...
Abstract. This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFS...
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
The use of airbags into automobiles has significantly improved the safety of the occupants. Unfortunately, when airbags are deployed in the case of a crash, they can also cause fa...