Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
In this paper, we present a way of how to handle incomplete knowledge concerning moving objects. Our approach is based on the basic Qualitative Trajectory Calculus (QTCB), which is...
Nico Van de Weghe, Peter Bogaert, Anthony G. Cohn,...
We extend Howe’s method to prove that input-early strong and -delay contextual bisimulations are congruences for the Higher-order mobile embedded resources (Homer) calculus, a ty...
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...