Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
Our current understanding of human interaction with hybrid or augmented environments is very limited. Here we focus on `tangible interaction', denoting systems that rely on e...
The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a means...
Noura Faci, Sanjay Modgil, Nir Oren, Felipe Rech M...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...