With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
The SIM-DL theory has been developed to enable similarity measurement between concept specifications using description logics. It thus closes the gap between similarity theories f...
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Articulation work is a critical factor in information infrastructure building projects that involve multiple and diverse communities. It brings awareness of language differences, ...