Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
Mobile agents require access to computing resources on heterogeneous systems across the Internet. This demo illustrates how agents can negotiate terms and conditions of resource a...
Michel A. Oey, Reinier J. Timmer, David G. A. Moba...
This paper describes the development of a predictive model for corporate insolvency risk in Australia. The model building methodology is empirical with out-ofsample future year te...
This paper addresses the challenging problem of statistics on images by describing average and variability. We describe computational anatomy tools for building 3-D and spatio-tem...
Guido Gerig, Brad Davis, Peter Lorenzen, Shun Xu, ...
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...