Algorithms that process geometric objects become more and more important for many safety-critical embedded systems, e.g. for motion planning or collision detection, where correctne...
This paper summarizes some of our unclassified work on concepts and techniques for performing automated runtime time-critical resource management (especially scheduling) in large ...
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
In this paper I review the Information Systems (IS) research on how developing countries have attempted to benefit from information and communication technologies (ICTs). First I ...