We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompos...
Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh ...
Abstract. Digital signage is a very attractive medium for advertisement and general communications in public open spaces. In order to add interaction capabilities to digital signag...
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
Abstract. User behaviors on a system vary not only among individuals but also within the same user when he/she gains experience on the system. We empirically investigated how indiv...
Kazunori Komatani, Tatsuya Kawahara, Hiroshi G. Ok...
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...