This paper explains some analyses that can be performed on a hierarchical finite state machine to validate that it performs as intended. Such a hierarchical state machine has tra...
Systems based on Service-Oriented Architecture are called service-based systems (SBS), and comprise of computing services offered by various organizations. Users of SBS often requ...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Next-generation software engineering is envisioned as a computational discipline that complements human capability through automated computation of software behavior and propertie...
Ali Mili, Tim Daly, Mark Pleszkoch, Stacy J. Prowe...
—This paper presents technology for performing autonomous commanding of a planetary rover. Through the use of AI planning, scheduling and execution techniques, the OASIS autonomo...
Tara A. Estlin, Daniel M. Gaines, Caroline Chouina...