Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
We discuss the problem of generating test suites from UML state machines and present a method to extend the capabilities of existing automated test case generators. Current tools p...
We present an automated and distributed real-time video surveillance system which can be used for the detection of objects and events in a wide range of applications. Video feeds ...
Drew Ostheimer, Sebastien Lemay, Mohammed Ghazal, ...
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integra...