The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
: We concentrate on two major aspects of reactive system design: behavior control and modularity. These are studied from a formal point of view, within the framework of action syst...
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Temporal correctness is crucial to the dependability of real-time systems. Few methods exist to test for temporal correctness and most existing methods are ad-hoc. A problem with ...
This paper provides an overview of fault injection techniques and their applicability to testing SOAP RPC based web service systems. We also give a detailed example of the WS-FIT ...
The development of complex software systems involves collecting software requirements from various stakeholders. Often stakeholder perceptions conflict during the requirements eli...
Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun,...
Function is a dynamic property closely related to the conformational mechanisms of the protein structure in its physiological environment. Efficient methods and tools for predicti...
Xiong Liu, Hassan A. Karimi, Lee-Wei Yang, Ivet Ba...
Time/utility function time constraints (or TUFs) and utility accrual (UA) scheduling optimality criteria, constitute, arguably, the most effective and broadest approach for adapti...
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...