This paper presents an approach which supports verification and model-based adaptation of software compod services implemented using Windows Workflow Foundation (WF). First, we pr...
Abstract. We present a new method for automatic generation of loop invariants for programs containing arrays. Unlike all previously known methods, our method allows one to generate...
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
Abstract--Modeling background and segmenting moving objects are significant techniques for video surveillance and other video processing applications. Most existing methods of mode...
Abstract. The growing availability of measurement devices in the operating room enables the collection of a huge amount of data about the state of the patient and the doctors’ pr...