When reasoning about inductively defined predicates, such as typing judgements or reduction relations, proofs are often done by inversion, that is by a case analysis on the last r...
Abstract. Various applications in uid dynamics and computational continuum mechanics motivate the development of reliable and ecient adaptive algorithms for mixed nite element m...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
This paper is concerned with frequency adverbs in Japanese. Many linguists have pointed out that frequency statements and generic sentences have multiple readings when they co-occ...
This paper describes the development of a decision support tool, an adoption assessment matrix based on critical adoption factors, that addresses a need in industry; namely, to im...