We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target a...
When a system fails to satisfy its speciļ¬cation, the model checker produces an error trace (or counter-example) that demonstrates an undesirable behavior, which is then used in d...
The parameterized pattern matching problem is a kind of pattern matching problem, where a pattern is considered to occur in a text when there exists a renaming bijection on the alp...
Tomohiro I, Shunsuke Inenaga, Hideo Bannai, Masayu...
Abstract. In this paper, we have investigated the feasibility of a selforganized evacuation process when compared with a centralized control. The evacuation strategy is based on ā...
The paper focuses on the structure of fundamental sequences of ordinals smaller than Īµ0. A ļ¬rst result is the construction of a monadic second-order formula identifying a given ...