Emerging economic P2P applications share the common need for an efficient, secure payment mechanism. In this paper, we present PPay, a micropayment system that exploits unique cha...
Abstract. There have been several timed extensions of ACP-style process algebras with successful termination. None of them, to our knowledge, are equationally conservative (ground-...
Jos C. M. Baeten, Mohammad Reza Mousavi, Michel A....
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
Hybrid systems are an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. A simple extension, a network of comm...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...