Sciweavers

ISICT
2003
13 years 6 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
ISICT
2003
13 years 6 months ago
Topic maps for context management
Abstract. The advent of context-aware computing requires a new paradigm in information management. Context information in a computing environment will take the form of disparate an...
Ruaidhri Power
ISICT
2003
13 years 6 months ago
Applications considered harmful for ambient systems
The notion of application – a single, bounded piece of functionality presented to users – goes almost unquestioned. However in the context of highly adaptive and ambient system...
Simon Dobson