This paper presents a model-based approach to requirements engineering for reactive systems; we use an elevator controller as case study. We identify and justify two key propertie...
Deriving products from a software product line is difficult, particularly when there are many constraints in the variability of the product line. Understanding the impact of variab...
The need for traffic analysis and traffic management applies to a vast range of disciplines. Simulation of traffic may assist in both analysis and management of traffic. In many s...
Abstract. This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a...
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...