A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
We present a single-stage multiple-comparison procedure for comparing parameters of independent systems, where the parameters are not necessarily means or steady-state means. We a...
We develop a hierarchical distributed production planning and control methodology, called DISCS, for a large and unstable semiconductor manufacturing process. The upper layer of D...
In standard optimistic parallel event simulation, no restriction exists on the maximum lag in simulation time between the fastest and slowest logical processes (LPs). Overoptimist...
We present a formulation of interconnection models and present the unit and syntactic models -- the primary models used for managing the evolution of large software systems. We di...