Runtime monitoring support serves as a foundation for the important tasks of providing security, performing debugging, and improving performance of applications. Often runtime mon...
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...