In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
We study complexity issues related to the model-checking problem for LTL with registers (a.k.a. freeze LTL) over one-counter automata. We consider several classes of one-counter au...
Existing research on synchronous remote working in CSCW has highlighted the troubles that can arise because actions at one site are (partially) unavailable to remote colleagues. Su...
Dylan Tutt, Jon Hindmarsh, Muneeb Shaukat, Mike Fr...
The methods and technologies providing advantages in controlling and managing intellectual property rights are currently associated under the term Digital Rights Management (DRM)....
Individual functional requirements represent fragments of behavior, while a design that satisfies a set of functional requirements represents integrated behavior. This perspective ...