Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
We describe our work on seeding and building a developmental learning community for recruiting and retaining women in educational programs and careers related to computing and inf...
Mary Beth Rosson, Hansa Sinha, Dejin Zhao, John M....
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...
Abstract. While interactive virtual humans are becoming widely used in education, training and delivery of instructions, building the animations required for such interactive chara...
In many scientific domains, researchers are turning to large-scale behavioral simulations to better understand real-world phenomena. While there has been a great deal of work on s...
Guozhang Wang, Marcos Antonio Vaz Salles, Benjamin...