Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
In this paper, by introducing the concept of command-to-state/output mapping, it is shown that the state of an uncertain nonlinear system can robustly be estimated if command-to-s...
This paper describes an approach and support tool for the modelling and analysis of proposed reconfigurations to complex systems. The configuration models used are quick to constr...
We present a process calculus where synchronous composition is the central algebraic notion; equivalences between processes via bisimilarity or trace can be studied quite simply i...
In this paper, we show how using data mining algorithms can help discovering pedagogically relevant knowledge contained in databases obtained from Web-based educational systems. Th...