This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Software firms are increasingly distributing their software development effort across multiple locations. In this paper we present the results of a two year field study that inves...
Systems such as adaptative and context–aware ones must adapt themselves to changing requirements at runtime. Modeling and implementing this kind of systems is a difficult opera...
In this position paper, we present MEADOWS, a software framework that we are building at HKUST (The Hong Kong University of Science and Technology) for modeling, emulation, and an...
Qiong Luo, Lionel M. Ni, Bingsheng He, Hejun Wu, W...
Abstract. In this paper, several important issues related to visual motion analysis are addressed with a focus on the type of motion information to be estimated and the way context...