Abstract. Among the branching-time temporal logics used for the specification and verification of systems, CTL+ , FCTL and ECTL+ are the most notable logics for which the precise...
In this paper we propose that a metaphor can be used to represent domains that are not easily quantifiable. The metaphor then can be used as an interface to communicate informatio...
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
We present a “heads-up” shorthand for entering text on a stylus-based computer very rapidly. The innovations are that (i) the stylus need never be lifted from the surface, and...
Today, most personal mobile devices (e.g. cell phones and PDAs) are multimedia-enabled and support a variety of concurrently running applications such as audio/video players, word...