Today's requirements engineering approaches focus on notation and techniques for modeling the intended functionality and qualities of a software system. Little attention has ...
During the last years, Intelligent Virtual Environments for Training have become a quite popular application of computer science to education. However, little attention is being p...
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
This paper focuses on two main areas. We first investigate various aspects of subscription and session Service Level Agreement (SLA) issues such as negotiating and setting up netwo...
Current technologies permit people to make use of various systems able to fulfill most of their needs while being at home. However, their use is often not intuitive and they are al...