The present paper analyzes a learning experience run at University of Macerata, during a post degree course for in service teachers and mature students. The course was delivered e...
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
This paper examines how circuits and systems made from molecular QCA devices might function. Our design constraints are “chemically reasonable” in that we consider the charact...
Michael T. Niemier, Michael Crocker, Xiaobo Sharon...
Software architecture diagrams and metrics are wellknown and heavily used in many areas in software engineering. However, they are rarely combined in one (visual) representation. ...
In this paper, we present our ongoing work on developing a framework for detecting time-varying communities on human mobile networks. We define the term community in environments ...