Reasoning about imperative programs requires the ability to track aliasing and ownership properties. We present a type system that provides this ability, by using regions, capabil...
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
This paper proposes a resilient, alternative monetary system on the Internet called i-WAT, based on WAT System[1] which uses a form of promissory note as the medium of exchanging g...
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to suppo...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...