We study complexity issues related to the model-checking problem for LTL with registers (a.k.a. freeze LTL) over one-counter automata. We consider several classes of one-counter au...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...
In this paper we present our experience in building a visual file manager, VennFS2, that offers to users an adaptive interface toward access to files. Our file manager was origina...
History Unwired (HU, see http://web.mit.edu/frontiers) is a multi-year investigation of the narrative uses of mobile technology in historic cities. In 2004-2005 a team of research...