A genetic algorithm encoding is proposed which is able to automatically satisfy a class of important cardinality constraints where the set of distinct values of the design variabl...
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Behavior of current communication protocols as well as current and future networked applications is of fundamental importance for technical and commercial success of Mobile Intern...
Markku Kojo, Andrei Gurtov, Jukka Manner, Pasi Sar...
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Today’s integrated development environments (IDEs) are hampered by their dependence on files and file-based editing. We propose a novel user interface that is based on collectio...
Andrew Bragdon, Steven P. Reiss, Robert C. Zelezni...