Many techniques for the verification of reactive systems rely on the analysis of their reachable state spaces. In this paper, a new algorithm for the symbolic generation of the sta...
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Increasingly, information systems development occurs in the context of existing systems and established organizational processes. Viewing organizational and system components as c...
Eric S. K. Yu, Philippe Du Bois, Eric Dubois, John...
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satises predened delay requiremen...
Although regarded as one of the most successful algorithm to identify predictive features, Relief is quite vulnerable to outliers and noisy features. The recently proposed I-Relief...