This paper presents a region analysis and transformation framework for Java programs. Given an input Java program, the compiler automatically translates it into an equivalent outp...
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
An emerging approach to multi-device application development developers to build an abstract semantic model that is translated into specific implementations for web browsers, PDAs...
Yves Gaeremynck, Lawrence D. Bergman, Tessa A. Lau
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
This paper is concerned with the complexity of proofs and of searching for proofs in two propositional proof systems: Resolution and Polynomial Calculus (PC). For the former syste...