Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
In many applications, the underlying data (the web, an XML document, or a relational database) can be seen as a graph. These graphs may be enriched with weights, associated with t...
This paper discusses software development using the Test Driven Development (TDD) methodology in two different environments (Windows and MSN divisions) at Microsoft. In both these...
Many documents that can be found in the World Wide Web include some kind of geographical information, often in an implicit way. The use of resources like gazetteers and geographic...