Configurable process models integrate different variants of a business process into a single model. Through configuration users of such models can then combine the variants to deri...
Florian Gottschalk, Teun A. C. Wagemakers, Monique...
In this paper, we present an integrated planning and robotic architecture that actively directs an agent engaged in an urban search and rescue (USAR) scenario. We describe three s...
Kartik Talamadupula, J. Benton, Paul W. Schermerho...
Statistical testing of software based on a usage model is a cost-effective and efficient means to make inferences about software quality. In order to apply this method, a usage m...
We present Delta Execution, a technique that speeds up state-space exploration of object-oriented programs. Statespace exploration is the essence of model checking and an increasin...
Marcelo d'Amorim, Steven Lauterburg, Darko Marinov
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...