We elaborate on a metamorphic approach for testing industrial control
sy...
The Internet has become a prime subject to security attacks and intrusio...
In this paper we evaluate the use of system identification methods to bu...
In this paper, we report on our 5-year's practical experience of designi...
The management of the energy consumption and thermal dissipation of
mult...
In this paper, we overview our experiences of developing large set of op...