We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for nondestructive testing (N...
Runzhen Huang, Kwan-Liu Ma, Patrick S. McCormick, ...
We designed and evaluated an agent that recommends a pointing device gain for a given user, with mixed success. 12 participants with physical impairments used the Input Device Age...
Heidi Horstmann Koester, Edmund F. LoPresti, Richa...
Abstract—Energy efficiency is a central challenge in batteryoperated sensor networks. Current energy-efficient mechanisms employ either duty cycling, which reduces idle listeni...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
Data consistency protocols are vital ingredients of mobile data management systems. Notable research efforts have been spent to find adequate consistency models for allowing mobi...