This paper presents a generic methodology to transform a protocol resilient to process crashes into one resilient to arbitrary failures in the case where processes run the same te...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
In this paper, we demonstrate how a precise semantics of object-oriented modeling techniques can be achieved, and what the possible bene ts are. We outline the main modeling techni...
Ruth Breu, Radu Grosu, Franz Huber, Bernhard Rumpe...
We provide a detailed description of refinement in Event-B, both as a contribution in itself and as a foundation for the approach to simultaneous animation of multiple levels of re...
Stefan Hallerstede, Michael Leuschel, Daniel Plagg...
A method for image matching from partial blurry images is presented that leverages existing text retrieval algorithms to provide a solution that scales to hundreds of thousands of...