Computer forensics is a relatively new, but growing, field of study at the undergraduate college and university level. This paper describes some of the course design aspects of te...
The maintenance dataset provided by SunWater contains information about failed assets also known as components and their corresponding failure modes. Currently, extraction of this...
Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
We address the problem of automatic synthesis of decision procedures. Our synthesis mechanism consists of several stages and submechanisms and is well-suited to the proof-planning ...
Abstract. We present a methodology of how to use a top-level ontology to create a domain ontology from existing scientific texts by (1) identifying informal definitions of domain-s...