Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Developing virtual reality (VR) applications which enable actual work over a period of time requires optimization of the most basic interactions, such as object manipulation, so t...
Ivan Poupyrev, Suzanne Weghorst, Mark Billinghurst...
— In this paper, a revised form of Implicit Context Representation Cartesian Genetic Programming is used in the development of a diagnostic tool for the assessment of patients wi...
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
Over the years the software engineering community has increasingly realized the important role software architecture plays in fulfilling the quality requirements of a system. The ...