Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
—Radar high-resolution range profiles (HRRPs) are typical high-dimensional, non-Gaussian and interdimension dependently distributed data, the statistical modelling of which is a...
Lei Shi, Penghui Wang, Hongwei Liu, Lei Xu, Zheng ...
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...