Abstract. We specify an information flow analysis for a simple imperative language, using a Hoare-like logic. The logic facilitates static checking of a larger class of programs t...
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
: Almost ten years ago, Ralf Hinze has written a functional pearl on how to derive backtracking functionality for the purely functional programming language Haskell. In these notes...
Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the p...
Jason L. Hill, Robert Szewczyk, Alec Woo, Seth Hol...
Most control systems of flexible production cells have a hierarchical structure. They become very complicated and difficult to maintain and modify when the underlying production c...
J. M. van de Mortel-Fronczak, J. P. M. Schmitz, J....