This paper presents new textural features which are based on association rules. We give a texture representation, which is an appropriate formalism, that allows straightforward app...
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
The number of news reports published online is now so great that it is impossible for any person to read all of them. Not all of these reports are equally interesting. Automating ...
CBR systems solve problems by assessing their similarity with already solved problems (cases). Explanation of a CBR system prediction usually consists of showing the user the set o...
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
This paper addresses the conflicting dimension of groupware, seeking the reconciliation of two very different assumptions about the users' attitudes using groupware tools: use...
Collaborative mobile applications support users on the move in order to perform a collaborative task. One of the challenges when designing such applications is to consider the cont...
MAS is a powerful paradigm in nowadays distributed systems, however its disadvantage is that it lacks the interconnection with semantic web standards such as OWL. The aim of this a...
Michal Laclavik, Zoltan Balogh, Marian Babik, Ladi...