Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
The synthesis of object behaviour from scenarios is a well-known and important issue in the transition from system analysis to system design. We describe a model transformation pro...
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Background: The accumulation of high-throughput data greatly promotes computational investigation of gene function in the context of complex biological systems. However, a biologi...
During activated states in vivo, neocortical neurons are subject to intense synaptic activity and high-amplitude membrane potential ðVmÞ fluctuations. These ‘‘high-conducta...
Martin Pospischil, Zuzanna Piwkowska, Michelle Rud...