We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
One of the challenges faced by network management systems is the increasing need for consistent management of physical network equipment. We propose a solution where equipment is m...
Krzysztof Miksa, Marek Kasztelnik, Pawel Sabina, T...
Goal-setting has been shown to be an effective strategy for changing behavior; therefore employing goal-setting in persuasive technologies could be an effective way to encourage b...
Sunny Consolvo, Predrag V. Klasnja, David W. McDon...
The wide applications of cyber-physical systems (CPS) call for effective design strategies that optimize the performance of both computing units and physical plants. We study the ...
Fumin Zhang, Klementyna Szwaykowska, Wayne Wolf, V...
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...