Implementing an extension of a legacy operating system requires knowing what functionalities the extension should provide and how the extension should be integrated with the legac...
Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, ...
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
Abstract. This paper presents a theoretical study of the selection pressure in asynchronous cellular evolutionary algorithms (cEAs). This work is motivated by the search for a gene...
While implicit invocation (publish-subscribe) systems have goodengineering properties, they are difficult toreason about and to test. Model checking such systems is an attractive...
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...