Timed automata has been used as a powerful formalism for specifying, designing, and analyzing real time systems. We consider the generalization of timed automata to Pushdown Timed ...
McEliece scheme represents a code-based public-key cryptosystem. So far, this cryptosystem was not employed because of efficiency questions regarding performance and communicatio...
Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter...
For small, inexpensive, ubiquitous wireless sensors to be realized, all constituents of the device, including the power source, must be directly integratable. For long term applic...
Elizabeth K. Reilly, Eric Carleton, Paul K. Wright
: Self-adaptive software systems use observations of their own behavior, and that of their environment, to select and enact adaptations in accordance with some objective(s). This a...
This paper reports on results concerning the combination of non-standard semantics via interpreters. We define what a semantics combination means and identify under which condition...