Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Background: Comfrey (Symphytum officinale) is a perennial plant and has been consumed by humans as a vegetable, a tea and an herbal medicine for more than 2000 years. It, however,...
Lei Guo, Nan Mei, Stacey L. Dial, James C. Fuscoe,...
Abstract. The task of information extraction can be seen as a problem of semantic matching between a user-defined template and a piece of information written in natural language. T...