Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
In huge online games where great numbers of players can be connected at the same time, social interaction is complex and conflicts become part of everyday life. There is a set of ...
Visual metaphors describe cognitive processes in every part of life and function as a connection between what we see and what we think. Mental activities and perceptional interact...
It’s been noticed that recognizing the end user’s needs and expectations are increasingly important factors for creating successful products. In the Mode-project we are studyi...
What EDI needs is a good semantics, that is, a workable formal theory of what EDI messages mean. As is widely recognized, the point applies to electronic commerce and to communica...