We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collabo...
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
A novel decomposition of functions using generalized bitplanes has been recently proposed. Such a decomposition maps a function into a set of indexes, thus performing quantization...
In this work, we demonstrate examples about uses of practical image processing techniques over a new interpretation of power quality event data. Power quality event data are 1D da...