Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
This paper describes the formalisation of Java thread synchronisation in an extended Owicki-Gries theory, which facilitates the proof of safety and progress properties of multi-th...
— IETF has developed Mobile IP to support mobility of IP hosts at the network layer. The National Aeronautics and Space Administration has implemented Mobile IP to handle handove...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
— Software maintenance tools for program analysis and refactoring rely on a meta-model capturing the relevant properties of programs. However, what is considered relevant may cha...