Much work has been done in the area of qualitative spatial reasoning over the past years, with application in various domains. However, existing models only capture particular asp...
The monitoring of properties of complex software systems can provide the core functionality for detecting violations of such properties. However, the violations detection cannot be...
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs...
d Abstract) David Kitchin, Evan Powell, and Jayadev Misra The University of Texas at Austin The real world is inherently concurrent and temporal. For simulating physical phenomena ...