For Model Driven Development approaches to succeed, there is a need for model validation techniques. This paper presents an approach to testing designs described by UML class diag...
Trung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh,...
In this paper we present a toolkit for realizing capacitive sensing applications for human-computer interaction in pervasive computing systems. We argue that capacitive sensors - ...
Raphael Wimmer, Matthias Kranz, Sebastian Boring, ...
Abstract. In this paper, we present the preliminary results of an ongoing research activity concerning the temporal management of normative texts in XML format. In particular, four...
Fabio Grandi, Federica Mandreoli, Paolo Tiberio, M...
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...