The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
A process, based on argumentation theory, is described for classifying very noisy data. More specifically a process founded on a concept called “arguing from experience” is des...
Maya Wardeh, Frans Coenen, Trevor J. M. Bench-Capo...
Abstract. This paper aims at providing a rigorous definition of selforganization, one of the most desired properties for dynamic systems (e.g., peer-to-peer systems, sensor networ...
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...