To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate ...
Registered Engineers are expected to be aware of their responsibilities as professionals. Those who practice Software Engineering often enter that profession without either an eng...
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
We deal with a two-queue model with mixed exhaustive and gated-type K-limited services. This model can achieve various degrees of priority in each queue by varying the value of K....
For the game of Hex, we find conditions under which moves into a 4-3-2 edge template are provably inferior. H.J. van den Herik et al. (Eds.): CG 2008, LNCS 5131, pp. 229-240, 2008....