Abstract. People with special needs may find difficulties using electronic consumer devices, user interfaces limit their chances of having full control on them. The Universal Remot...
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Screen readers can drive braille devices for allowing visually impaired users to access computer environments, by providing them the same information as sighted users. But in some...
ABSTRACT: Knowledge systems for scientific and engineering endeavors must be able to insure the accuracy, completeness, and validity of their contents. When designed as such, these...
A. H. Liszka, William A. Stubblefield, Stephen D. ...
Abstract. The quest for modular concurrency reasoning has led to recent proposals that extend program assertions to include not just knowledge about the state, but rights to access...
Ernie Cohen, Eyad Alkassar, Vladimir Boyarinov, Ma...