If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Abstract We present the first method to handle curvature regularity in region-based image segmentation and inpainting that is independent of initialization. To this end we start f...
Thomas Schoenemann, Fredrik Kahl, Simon Masnou, Da...
Timing exception verification has become a center of interest as incorrect constraints can lead to chip failures. Proving that a false path is valid or not is a difficult problem ...
Event-driven automation of reactive functionalities for complex event processing is an urgent need in today's distributed service-oriented architectures and Web-based event-d...
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...