As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Near-term spoken language systems willlikely be limited in their interactive capabilities. To design them, we shall need to model how the presence or absence of speaker interactio...
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correc...