In many occasions would one encounter the task of maintaining the consistency of two pieces of structured data that are related by some transform ā synchronising bookmarks in diļ...
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
The growing success of wireless ad hoc networks and portable hardware devices presents many interesting problems to software engineers. Particular, coordination is a challenging t...
Marco Tulio de Oliveira Valente, Fernando Magno Qu...
The key problem in applying veriļ¬cation techniques such as model checking to agent architectures is to show how to map systematically from an agent program to a model structure t...
Modern embedded systems are often heterogeneous in that their design requires several description paradigms, based on different models of computation and concurrency (MoCCs). In th...