Human computer interaction (HCI) has little explored everyday life and enriching experiences in rural, wilderness and other predominantly ‘‘natural’’ places despite their s...
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...