Disproof can be as important as proof in studying programs and programming languages. In particular, side conditions in a statement about program behavior are sometimes best unders...
In a mobile setting, users use, handle and search for online information in a different way. Two features typically desired by mobile users are tailored information delivery and co...
William Van Woensel, Sven Casteleyn, Olga De Troye...
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
: In a heterogeneous, dynamic environment, like Grid, post-mortem analysis is of no use and data needs to be collected and analysed in real time. Novel techniques are also required...
Ajanta De Sarkar, Sarbani Roy, Sudipto Biswas, Nan...
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...