Verifying that a piece of software has no bugs means proving that it has certain desired properties, such as an array index not taking values outside certain Abstract interpretati...
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Abstract. We propose the sensor network system using the microcomputer board that can connect to the Internet. This proposed system can acquire information from the sensor of the m...
Given a Euclidean graph G over a set P of n points in the plane, we are interested in verifying whether G is a Euclidean minimum spanning tree (EMST) of P or G differs from it in ...
A color scale was designed with an approach that combined both human visual response to color and physical properties of color. The design was initiated with a subjective evaluati...