This paper extends the methodology of analytic real-time analysis of distributed embedded systems towards merging and extracting sub-streams based on event type information. For e...
Simon Perathoner, Tobias Rein, Lothar Thiele, Kai ...
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...