The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Stories make our experiences memorable over time. In constructing and sharing our personal and communal memories, we move in a reflective manner back and forth between our lifewor...
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
Huge size and high complexity of legacy software are the main sources of today's software evolution problems. While we can ease software evolution with re-engineering tools, ...