Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
The aim of this work is the design of a framework for the revision of knowledge in abductive reasoning agents, based on interaction. We address issues such as: how to exploit knowl...
As the complexity and scale of current scientific and engineering applications grow, managing and transporting the large amounts of data they generate is quickly becoming a signif...
Due to the technical developments in electronics the amount of digital content is continuously increasing. In order to make digital content respectively multimedia content availab...
Thomas Plagemann, Vera Goebel, Andreas Mauthe, Lau...
Advances in communication technology allow a variety of new network environments and services available very rapidly. Appearance of various network environments tends to enable a ...
Jae-Hyun Hwang, Jin-Hee Choi, Se-Won Kim, Chuck Yo...