State-equivalence based reduction techniques, e.g. bisimulation minimization, can be used to reduce a state transition system to facilitate subsequent verification tasks. However...
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
Despite its usefulness in many applications, the medial axis transform (MAT) is very sensitive to the change of the boundary in the sense that, even if a shape is perturbed only s...