On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
The increasing variety of different devices with different screen size, interaction paradigms and application areas raises the need for new technologies of cross-device developmen...
Many tools exist for developing real-time distributed groupware, but most of these tools focus primarily on the performance of the resulting system, or on simplifying the developm...
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...