In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
According to cognitive science literature, human memory is predicated on contextual cues (e.g., room, music) in the environment. During recall tasks, we associate information/acti...
Joshua M. Hailpern, Nicholas Jitkoff, Andrew Warr,...
This is an extended version of an essay with the same title that I wrote for the workshop Algebraic Process Calculi: The First Twenty Five Years and Beyond, held in Bertinoro, Ita...
Today’s software does not come with meaningful guarantees. This position paper explores why this is the case, suggests societal and technical impediments to more dependable softw...
This is a very nice article that explains the Documentum Foundation Class and how it relates to .NET programming. I developed a lot of applications using .NET that work with Docume...