The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
— Most biomedical research databases contain considerable amounts of time-oriented data. However, temporal knowledge about the contextual meaning of such data is not usually repr...
Abstract. Conceptual models are formal descriptions of application domains that are used in early stages of system development to support requirements analysis. The Unified Modeli...