With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
The Web can be naturally modeled as a directed graph, consisting of a set of abstract nodes (the pages) joined by directional edges (the hyperlinks). Hyperlinks encode a considerab...
Cognitive neuroscientists habitually deny that functional neuroimaging can furnish causal information about the relationship between brain events and behavior. However, imaging st...
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...
o Authors of Extended Abstracts William Pugh Dept. of Computer Science and Institute for Advanced Computer Studies Univ. of Maryland, College Park March 16, 1993 This article stems...