This paper addresses the issues related to the decision processes of manufacturing system simulation. The manufacturing system is perceived in terms of intelligent entities capabl...
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
: This paper describes the taxonomy for designing interactive groupware systems. The taxonomy defines the objectives, methods and principles for classifying models and facilitates ...
Prior knowledge over general nonlinear sets is incorporated into nonlinear kernel classification problems as linear constraints in a linear program. The key tool in this incorpora...