In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
A problem with many of today's appliance interfaces is that they are inconsistent. For example, the procedure for setting the time on alarm clocks and VCRs differs, even amon...
Most co-authoring tools support basic annotations, such as edits and comments that are anchored at specific locations in the document. However, they do not support metacommentary ...
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise’s management executives. Such alignment is an organization-wide issue that...
Leonel Plazaola, Johnny Flores, Norman Vargas, Mat...
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...