Abstract. Many software architecture evaluation methods, proposed by the research community, have a common problem of engaging the same architects to perform architecture design an...
In the recent development ofwrious models of learning inspired by the PAC learning model (introduced by Valiant) there has been a trend towards models which are as representation ...
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Due to the increasing elderly population, healthcare systems able to promote independent living are regarded as an emerging market. Despite the significant advances aiming to supp...