To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
An active research area in telecommunications concerns how to specify and control the addition of new services, such as call waiting or instant messaging, into existing software. ...
Emden R. Gansner, John M. Mocenigo, Stephen C. Nor...
Performance prediction methods for component-based software systems aim at supporting design decisions of software architects during early development stages. With the increased a...
— Describing and managing activities, resources and constraints of software development processes is a challenging goal for many organizations. A first generation of Software Pro...
In this paper, we present and illustrate an approach to compositional reasoning for hardware/software co-verification of embedded systems. The major challenges in compositional rea...