The lack of structure in the content of email messages makes it very hard for data channelled between the sender and the recipient to be correctly interpreted and acted upon. As a...
Simon Scerri, Myriam Mencke, Brian Davis, Siegfrie...
Abstract— As the technologies of autonomic computing become more prevalent, it is essential to develop methodologies for testing their dynamic self-management operations. Self-ma...
Tariq M. King, Alain E. Ramirez, Rodolfo Cruz, Pet...
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...
Abstract. We present a new methodology that permits to reuse an existing hardware component that has not been developed within the B framework while maintaining a correct design ï¬...
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...