Approximately 70% of the source code of a software system consists of identifiers. Hence, the names chosen as identifiers are of paramount importance for the readability of comp...
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
The vision of semantic interoperability, the fluid sharing of digitalized knowledge, has led much research on ontology/schema mapping/aligning. Although this line of research is f...
Hung-Ju Chu, Randy Y. C. Chow, Su-Shing Chen, Raja...
An important challenge within the field of Criminology is to investigate the spatio-temporal dynamics of crime. Typical questions in this area are how the behaviour of offenders, ...
Combining third party software components to customer-individual application systems requires first, standardized specification techniques for describing the technical as well as ...