The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
A number of techniques and software tools for embedded system design have been recently proposed. However, the current practice in the designer community is heavily based on manua...
Alberto L. Sangiovanni-Vincentelli, Antonino Damia...
As the field of human-computer interaction matures, the need for proven, dependable engineering processes for interface development becomes apparent. Our continuing work in develo...
Jason Chong Lee, Christa M. Chewar, D. Scott McCri...