The exchange of data between different models in a multisimulation environment is about the exchange of information from within the context of two separate worldviews. This amount...
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
It has become good practice to expect authors of new model checking algorithms to provide not only rigorous evidence of the algorithms correctness, but also evidence of their pract...
This paper is a report of some of the findings in a study of how and what women in computer science learn using the Internet for communication with other women. The focus of this ...