We present a survey of control-flow analysis of functional programs, which has been the subject of extensive investigation throughout the past 30 year...
نشرت في: 2012
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an expensive resource and time-consuming problem. In this sur...
Microprocessor design has recently encountered many constraints such as power, energy, reliability, and temperature. Among these challenging issues, t...
Ontologies are often viewed as the answer to the need for interoperable semantics in modern information systems. The explosion of textual information...
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. We provide a c...