Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
This paper analyses the collaborative design of a high-technology product, a neuromagnetometer used in the analysis of the activity of the human cortex. The producer, Neuromag Com...
Formal description techniques, verification methods, and their tool-based automated application meanwhile provide valuable support for the formal analysis of communication protocol...
In this article, we present a rule-based language dedicated to topological operations, based on graph transformations. Generalized maps are described as a particular class of graph...
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...