We present a library of implemented HPSG analyses for argument optionality based on typological studies of this phenomenon in the world's languages, developed in the context ...
New digital subscriber line (DSL) technologies are being developed to meet the ever-increasing bandwidth demand of the user. One very promising approach injects "common-mode&q...
Wim Foubert, Carine Neus, Leo Van Biesen, Yves Rol...
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
■ Knowledge about cause and effect relationships (e.g., virus– epidemic) is essential for predicting changes in the environment and for anticipating the consequences of events...
Daniela B. Fenker, Mircea Ariel Schoenfeld, Michae...