We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bounded Model Checking (BMC) searches for counterexamples to a property with a bounded length k. If no such counterexample is found, k is increased. This process terminates when ...
A multi-cluster computational environment with mixed-mode (MPI + OpenMP) parallelism for estimation of unknown regional electrical conductivities of the human head, based on realis...
Adnan Salman, Sergei Turovets, Allen D. Malony, Je...
Methods of Computational Fluid Dynamics are applied to simulate pulsatile blood flow in human vessels and in the aortic arch. The non-Newtonian behaviour of the human blood is in...
Renat A. Sultanov, Dennis Guster, Brent Engelbrekt...
Given two points on a closed planar curve, C, we can divide the length of a shortest connecting path in C by their Euclidean distance. The supremum of these ratios, taken over all...