Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
— What would it be like if we could give our robot high level commands and it would automatically execute them in a verifiably correct fashion in dynamically changing environmen...
David C. Conner, Hadas Kress-Gazit, Howie Choset, ...
A software system is continuously changed so many times. When we try to change a software, we must understand how the software is implemented, especially about the functions to be...
Koji Taniguchi, Takashi Ishio, Toshihiro Kamiya, S...
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Developing effective content recognition methods for diverse imagery continues to challenge computer vision researchers. We present a new approach for document image content catego...
Guangyu Zhu, Xiaodong Yu, Yi Li, David S. Doermann