Abstract. In this paper we introduce a numerical procedure for performing dynamic data driven simulations (DDDAS). The main ingredient of our simulation is the multiscale interpola...
Craig C. Douglas, Chad E. Shannon, Yalchin Efendie...
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Abstract. Complexity in software design refers to the difficulty in understanding and manipulating the set of concepts, models and techniques involved in the design process. Agents...
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...