Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Abstract. We study a process algebra which combines both nondeterministic and probabilistic behavior in the style of Segala and Lynch’s simple probabilistic automata. We consider...
There has recently been an increase in interest, among information systems architecture practitioners, in using viewpoints for architectural definition and description. This has be...
Distributed hash tables have been around for a long time [5, 7]. A number of recent projects propose peerto-peer DHTs, based on multi-hop lookup optimizations. Some of these syste...
This paper studies the “intermittent” chaos and subharmonics observed in switching dc/dc converters using a simple circuit model that describes possible unintended coupling of...
C. K. Michael Tse, Yufei Zhou, Francis Chi-Moon La...