In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
— We present an integrated method for program proving, testing, and debugging. Using the concept of metamorphic relations, we select necessary properties for target programs. For...
An operational framework is developed for testing stationarity relatively to an observation scale. The proposed method makes use of a family of stationary surrogates for defining ...
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
Flexible parts feeding techniques have recently begun to gain industry acceptance. However, one barrier to effective flexible feeding solutions is a dearth of knowledge of the und...
Greg C. Causey, Roger D. Quinn, Michael S. Branick...