Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
AdvanceobjectorientedcomputingplatformsuchastheCommonObjectRequestBrokerArchitecture (CORBA) provides a conducive and standardized framework for the development of distributed appl...
Hung Keng Pung, Wynne Hsu, Bhawani S. Sapkota, Law...
The European Molecular Biology Laboratory (EMBL) Nucleotide Sequence Database (http://www.ebi.ac. uk/embl/index.html ) is maintained at the European Bioinformatics Institute (EBI)...
Wendy Baker, Alexandra van den Broek, Evelyn Camon...
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...