This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
State-of-art image retrieval techniques have been developed to support high-level (semantics) querying and browsing of images. For certain user queries, it is also very important ...
With the increasing number of geographical image databases on the Internet, it is a very important issue to know about the most relevant image databases for given user queries, in...
Abstract. Groote, Pang and Wouters (2001) analyzed an existing distributed lift system using the process algebraic toolset µCRL. Pang, Karstens and Fokkink (2003) analyzed a redes...
We build on work in designing modeling languages for hybrid systems in the development of CTA, the Cottbus Timed Automata. Our design features a facility to specify a hybrid system...