Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
—A moth behavior-inspired strategy, including tracing a chemical plume to its source and declaring the source location, was tested in near shore ocean conditions via a REMUS unde...
Many software systems are mixed-language systems today, i.e., they bind together components defined in different programming and specification languages. Analyses and refactorin...
We present an operational model for describing random reactive systems. Some models have already been proposed for this purpose, but they generally aim at performing global reason...
Predominant resources for execution of any application are computational power and memory. On one side, computational power has grown many folds faster than memory capacity. On th...