Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...
Transferring knowledge from one domain to another is challenging due to a number of reasons. Since both conditional and marginal distribution of the training data and test data ar...
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
This paper describes a large rule-based application called Engineering Standards Distribution System (ESDS). ESDS was built and deployed by Boeing and helps design engineers speci...