Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Abstract. These notes deal with an interconnecting web of mathematical techniques all of which deserve a place in the armoury of the welleducated computer scientist. The objective ...
We prove that a bounded stack can be specified in process algebra with just the operators alternative and sequential composition and iteration. The bounded bag cannot be specified ...
Abstract. This paper presents viewpoint-dependent constraints that relate image features such as t-junctions and inflections to the pose of curved 3D objects. These constraints can...
This paper studies the (in)equational theory of simulation preorder and equivalence over the process algebra BCCSP. We prove that in the presence of a finite alphabet with at least...