Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely oft...
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we sho...