Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
We present a system for collaborative conceptual design that allows users potentially located in geographically distant areas to cooperate by sketching, exploring and modifying the...
We develop a system of type assignment with intersection types, union types, indexed types, and universal and existential dependent types that is sound in a call-by-value functiona...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
We present a 2D shape recognition and classification method based on matching shape outlines. The correspondence between outlines (curves) is based on a notion of an alignment cur...
Thomas B. Sebastian, Philip N. Klein, Benjamin B. ...