Abstract. Exploring any new data set always starts with gathering overview information. When this process is done non-visually, interactive sonification techniques have proved to b...
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Though verification tools are finding industrial use, the utility of engineering optimizations that make them scalable and usable is not widely known. Despite the fact that seve...
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
During our work with microfinance groups in rural India, we found that paper plays a crucial role in many local information practices. However, paperbased record keeping can be in...