We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pu...
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod ...
Does our preoccupation with navigable space distract us from the expressive potential of interactive media? Can our understanding of spatial context in virtual environments (VEs) ...
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...