Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
We describe a tool, called AX, that can be used in combination with the model checker SPIN to efficiently verify logical properties of distributed software systems implemented in A...
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Researchers of HIV-1 are today, still unable to determine exactly the biological mechanisms that cause AIDS. Various mechanisms have been hypothesized and their existences have be...