Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
In this paper we present a method to represent knowledge associated with a course. Course knowledge can be represented in the form of hierarchical prerequisite relation based weigh...
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol sp...
: Software development is still based on manufactory production, and most of the programming code is still hand-crafted. Software development is very far away from the ultimate goa...