Most network protocols are uni-modal: they employ a single set of algorithms that allows them to cope well only within a narrow range of operating conditions. This rigid design re...
With more and more large networks becoming available, mining and querying such networks are increasingly important tasks which are not being supported by database models and query...
As internet technology develops, we transfer more and more physical activities into cyberspace. On the other hand, mobile technology frees the location of cyberspace participants,...
—The stationarity hypothesis is largely and implicitly assumed when designing classifiers (especially those for industrial applications) but it does not generally hold in practic...
The three main assertion-based verification approaches are: Design by Contract (DBC), Extended Static Checking (ESC) and Verified Design by Contract (VDBC). Each approach offers a...