In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Di...
Poul Frederick Williams, Armin Biere, Edmund M. Cl...
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
This paper describes experiences with on-line and in-class sections of a writing-intensive course, including a collaborative library literacy unit. It reports on a mid-semester so...
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise...