We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
This paper presents a statistical approach to aggregating speed and phase (directional) information for vascular segmentation in phase contrast magnetic resonance angiograms (PC-MR...
Albert C. S. Chung, J. Alison Noble, Paul E. Summe...
We introduce a foundational language for modelling applications over global computers whose interconnection structure can be explicitly manipulated. Together with process distribut...