We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
We describe an implementation of a virtual environment for visualizing the geometry of curved spacetime by the display of interactive geodesics. This technique displays the paths ...
In this paper we study the relation between reversible and irreversible computation applicable to different models of computation -- here we are considering classical and quantum ...
This paper presents a design methodology for a hybrid Hardwarein-the-Loop (HIL) tester tool, based on both discrete event system theory, given by timed automata, and continuous sy...
: This paper presents a systematic approach based on the axiomatic design theory to assess the inherent flexibility of the product family to generate the product variants for custo...