Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
(a) (b) Figure 1: (a) CAM running on an iPhone; (b) Reading a design sketch using Microsoft's TagReader client. In this paper, we report the results of a field trial of a Ubi...
Dhaval Vyas, Anton Nijholt, Dirk Heylen, Alexander...
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Aging effects, environmental changes, thermal drifts, and soft and hard faults affect physical systems by changing their nature and behavior over time. To cope with a process evolu...