This paper addresses two closely related aspects of subjective information. First, no two agents necessarily see the same thing when they observe the same object. Second, no two a...
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
This paper presents an automatic methodology we used in an experiment to acquire a morphological lexicon for the Slovak language, and the lexicon we obtained. This methodology exte...
This paper presents an approach for relating informed task models and system models in the domain of safety critical interactive systems. The models, which are usually developed f...