Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
We study the equational theory of Timed CCS as proposed by Wang Yi in CONCUR’90. Common to Wang Yi’s paper, we particularly focus on a class of linearly-ordered time domains ex...
In this paper we consider various multi-component splittings based on the trapezoidal rule and the implicit midpoint rule. It will be shown that an important requirement on such me...
In this article we present a model of insect infestation of grape vines and consider the optimal control of the pest through the use of egg pesticides. We show existence and uniqu...
This text presents a set of reflections about the use of electronic publishing in African countries, as a means of access to scientific information. It includes brief remarks abou...