We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
— This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implic...
We present an end-to-end tool-chain for model-based design and analysis of component-based embedded realtime software, with Avionics Mission Computing as an application domain. Th...
Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Sh...
Data warehouse systems service larger and larger sets of data. Effective data indexing is not sufficient, because one system node is unable to store such amount ofquickly flowing ...
Marcin Gorawski, Michal Gorawski, Slawomir Bankows...
We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...