To the best of our knowledge, we characterize for the first time the importance of resources (counters, channels, alphabets) when measuring expressiveness of WSTS. We establish, f...
In this paper, we propose a new semantic clone detection e by comparing programs’ abstract memory states, which are computed by a semantic-based static analyzer. Our experimenta...
Heejung Kim, Yungbum Jung, Sunghun Kim, Kwangkeun ...
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
We study hierarchical segmentations that are optimal in the sense of minimal spanning forests of the original image. We introduce a region-merging operation called uprooting, and w...