Correctness of many hybrid and distributed systems require stability and convergence guarantees. Unlike the standard induction principle for verifying invariance, a theory for veri...
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
The focus of this paper is on student learning theory. Use is made of an "analytic discovery tool" called Quantitative CyberQuest (QCQ) to help conceptualize the many go...
Weblogs are becoming increasingly popular and bloggers desire traffic. This study seeks to give an overall view of weblog systems including factors that affect weblog traffic. Key...
Xitong Guo, Doug Vogel, Zhongyun Zhou, Xi Zhang, H...
Abstract— This paper deals with realization theory of socalled Nash systems, i.e. nonlinear systems the right-hand side of which is defined by Nash functions. A Nash function is...