When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
The diversity of negotiation types in e-commerce calls for a clear description of the rules that govern them. The participant has to know the rules before engaging in a negotiation...
Verification is one of the most critical and time-consuming tasks in today's design processes. This paper demonstrates the verification process of a 8.8 million gate design u...
Johann Notbauer, Thomas W. Albrecht, Georg Niedris...
Group Decision Support Systems (GDSS) present important limitations that constrain their usage in current organisations. The fundamental reason is the lack of integration in the c...