: The size and complexity of modern information systems together with requirements for short development time increase the demands for reuse of already existing solutions. The idea...
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
This paper presents an approach to Concept Analysis of structured, multivalued and incomplete data currently present in life science knowledge bases. We are concerned with tree str...
Lister and Leaney (Lister and Leaney, 2003b) presented a "coherent, explicit grading philosophy based on Bloom's taxonomy". I applied this philosophy to a second ye...
Research on practical design verification techniques has long been impeded by the lack of published and yet detailed error data. Over the last few years we have systematically coll...
David Van Campenhout, Trevor N. Mudge, John P. Hay...