We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
In this paper we consider the following scenario. A set of n jobs with different threads is being run concurrently. Each job has an associated weight, which gives the proportion ...
Micah Adler, Petra Berenbrink, Tom Friedetzky, Les...
2004 brought a landmark event in the changes to regulations governing hours of service for truck drivers. This paper describes an effort utilizing modeling and simulation for eval...
We introduce a new problem of automatic photo composition,
and present an effective technique for finding good
views within a panoramic scene. Instead of applying heuristic
rule...
Research in web services has allowed reusable, distributed, loosely coupled components which can easily be composed to build systems or to produce more complex services. Compositio...