We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-pro...
Sankalita Saha, Shuvra S. Bhattacharyya, Wayne Wol...
This paper presents a new architecture of a database management system intended to be used together with existing graphics software. In the first place, a system with this archite...
SimTutor is a multimedia intelligent tutoring system (ITS) for simulation modeling. Multimedia systems are now de facto standard on personal computers and increasing number of int...
While symmetry reduction has been established to be an important technique for reducing the search space in model checking, its application in concurrent software verification is ...