Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
Time-Of-Flight (TOF) positron emission tomography (PET) was studied and preliminarily developed in the 80s, but the lack of a scintillator able to deliver proper time resolution a...
Parham Geramifar, Mohammad Reza Ay, Mojtaba Shamsa...
E-commerce is growing at an exponential rate. In the last decade, there has been an explosion of online commercial activity enabled by World Wide Web (WWW). These days, many consu...