We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Recently, the field of color appearance modeling has been extended further into the spatial and temporal domains through efforts known as image appearance modeling. Image appearan...
Mark D. Fairchild, Garrett M. Johnson, Jiangtao Ku...
Abstract. Coordination languages are intended to simplify the development of complex software systems by separating the coordination aspects of an application from its computation ...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
This paper summarizes the main achievements of a research whose main goal was to investigate the current state-of-art in the field of requirements engineering for COTS-based system...
This paper describes a study of the use of multimedia networked location-aware mobile computers to support team-based survey-oriented fieldwork. Existing systems do not provide ful...