—This paper describes the design and implementation of an inference engine for the execution of Fuzzy Inference Systems (FIS), the architecture of the system is presented, and th...
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image ...
Abstract. Rotation distance quantifies the difference in shape between two rooted binary trees of the same size by counting the minimum number of elementary changes needed to tra...
The process of gene assembly in ciliates, an ancient group of organisms, is one of the most complex instances of DNA manipulation known in any organism. Three molecular operations...
: Previous work already investigated the value of ambient sound visualizations for deaf and hearing-impaired people. Our work builds upon these results and specifically explores th...