During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...
With the wide-spread popularity of the World-Wide Web (WWW), network and server load increases dramatically. Caching proxies have been introduced to improve the system performance...
Ka Lun Eddie Law, Biswajit Nandy, A. S. J. Chapman
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Hardware failures in autonomous and distributed software systems create the need for self-healing activities. This work addresses the problem of redeploying software components af...
State-of-art image retrieval techniques have been developed to support high-level (semantics) querying and browsing of images. For certain user queries, it is also very important ...