Rather than upgrading a software system to the next version by installing a new binary, software systems could be updated "on-thefly" during their execution. We are devel...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
— This paper presents the fuzzy video based emotion recognition system VISBER, that allows to analyze facial expressions in video sequences. In order to process images in real-ti...
Natascha Esau, Evgenija Wetzel, Lisa Kleinjohann, ...
Currently most Erlang programs contain no or very little type information. This sometimes makes them unreliable, hard to use, and difficult to understand and maintain. In this pap...
Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based systems....