Due to the significant progress in automated verification, there are often several techniques for a particular verification problem. In many circumstances different techniques are ...
This paper proposes HVEM-Grid, which is the cornerstone for tele-instrumentation infrastructure. The proposed architecture is mainly oriented for people whose primary work is to ge...
Hyuck Han, Hyungsoo Jung, Heon Young Yeom, Hee S. ...
Abstract. The use of a medical guideline can be seen as the execution of computational tasks, sequentially or in parallel, in the face of patient data. It has been shown that many ...
Arjen Hommersom, Perry Groot, Peter J. F. Lucas, M...
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
In this paper, we describe our application of SPIN 1 to model an algorithm used to synchronize the clocks of modules that provide periodic real-time communication over a network. W...