We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
Abstract. Symbolic state-space generators are notoriously hard to parallelise. However, the Saturation algorithm implemented in the SMART verification tool differs from other seque...
The metamodel techniques and model transformation techniques provide a standard way to represent and transform data, especially the software artifacts in software development. How...
Abstract—A fast offset surface generation approach is presented in this paper to construct intersection-free offset surfaces, which preserve sharp features, from freeform triangu...
This paper presents a novel methodology for deriving the dynamic equations of mechatronic systems from component models that are represented as linear graphs. This work is part of...
Antonio Diaz-Calderon, Christiaan J. J. Paredis, P...