Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
Abstract. Under dimly lit condition, it is difficult to take a satisfactory image in long exposure time with a hand-held camera. Despite the use of a tripod, moving objects in the ...
Web applications have become critical components of the global information infrastructure, and it is important that they be validated to ensure their reliability. Therefore, many ...
Sebastian G. Elbaum, Srikanth Karre, Gregg Rotherm...
We describe an efficient decentralized monitoring algorithm that monitors a distributed program's execution to check for violations of safety properties. The monitoring is ba...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...