A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...
This paper presents the System Status suite of applications. These applications are used to provide a simple, uniform, and low developer cost system for exporting and tracking the...
Abstract. Data warehouses (DW) main objective is to facilitating decisionmaking. Thus their development has to take into account DW project actor requirements. While much recent re...