Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Abstract. This paper studies the efficiency of several probabilistic model checkers by comparing verification times and peak memory usage for a set of standard case studies. The s...
David N. Jansen, Joost-Pieter Katoen, Marcel Olden...
Adapting to current context of usage is of fundamental importance for pervasive computing services. As the technology for acquiring contextual information is increasingly availabl...
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Improving project management, product development and engineering processes is for many companies crucial to survive in a fast changing environment. However, these activities are ...