—Caching is a popular technique for reducing both server load and user response time in distributed systems. In this paper, we consider the question of whether caching might be e...
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
Knowledge communities of all kinds have social and material practices for deciding what is known and who is to be trusted. In this paper, we address a specific kind of knowledge w...
Nancy A. Van House, Mark H. Butler, Lisa R. Schiff
The modelling of affective behaviour and appropriate bodily expression to make synthetic characters more believable becomes important in many types of applications such as games, s...