In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
This paper presents a spatial-semantic modeling system featuring automated learning of object-place relations from an online annotated database, and the application of these relat...
Pooja Viswanathan, David Meger, Tristram Southey, ...
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Abstract. This paper presents the design, implementation and experimental evaluation of a practical region-based partial dead code elimination (PDE) algorithm on predicated code in...
The environment is an important but overlooked piece in the construction of multiagent-based scenarios. Richness, believability and variety of scenarios are inseparable from the en...
Paul Hsueh-Min Chang, Kuang-Tai Chen, Yu-Hung Chie...