Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
—Model-based test derivation for real-time system has been proven to be a hard problem for exhaustive test suites. Therefore, techniques for real-time testing do not aim to exhau...
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Capturing the context of a user's query from the previous queries and clicks in the same session may help understand the user's information need. A context-aware approac...