High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
Background: In the post-genome era, most research scientists working in the field of proteomics are confronted with difficulties in management of large volumes of data, which they...
The extraction of reusable software components from existing systems is an attractive idea. The goal of the work in this paper is not to extract a component automatically, but to ...
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...