— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
—There are several institutions that accredit educational programs and require documentation to ensure that an educational program regularly meets certain criteria. This paper fo...
Eugene Essa, Andrew Dittrich, Sergiu M. Dascalu, F...
Model checking algorithms can report a property as being true for reasons that may be considered vacuous. Current algorithms for detecting vacuity require either checking a quadrat...
Regression testing is the verification that previously functioning software remains after a change. In this paper we report on a systematic review of empirical evaluations of regr...
Typical broadcast material contains not only studio-recorded texts read by trained speakers, but also spontaneous and dialect speech, debates with cross-talk, voice-overs, and on-...
Doris Baum, Daniel Schneider, Rolf Bardeli, Jochen...