We present an automated program analysis, called Reach, to compute program inputs that cause evaluation of explicitly-marked target expressions. Reach has a range of applications ...
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
Teams of autonomous vehicles (AVs) carry out missions in a number of fields such as space exploration and searchand-rescue. However, human supervision is still required to monito...
We present a primarily speech-based user interface to a wide range of entertainment, navigation and communication applications for use in vehicles. The multimodal dialog enables t...
Wolfgang Minker, Udo Haiber, Paul Heisterkamp, Sve...
A simple programmable Java platform-independent distributed computation system has been developed to exploit the free resources on computers linked together by a network. It is a ...
Andrew J. Page, Thomas M. Keane, Richard Allen, Th...