To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate ...
In this article we present a method for automatically constructing a solid (in the CAD sense) model of an unknown object from range images. The model acquisition system provides f...
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
: Specifying behavioral specifications for components apart from the conventional syntactic interface specifications can be very useful in component based system development. Preco...
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...