1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
This paper presents an integrated set of tools for performance-oriented development of software targeted to distributed heterogeneous systems. Using these tools, software developm...
A method is proposed for viewing broadcast content that converts TV programs into Web content and integrates the results with complementary information retrieved using the Interne...
Existing approaches to object-oriented system development are poorly integrated in several ways. This inadequate integration is ubiquitous and causes numerous inefficiencies in th...
Stephen W. Liddle, David W. Embley, Scott N. Woodf...