Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Background: The increasing availability and diversity of omics data in the post-genomic era offers new perspectives in most areas of biomedical research. Graph-based biological ne...
Alexander Martin, Maria Elena Ochagavia, Laya C. R...
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Exhaustive model checking search techniques are ineffective for error discovery in large and complex multi-threaded software systems. Distance estimate heuristics guide the concre...