Based on the invariant features and data distribution in time domain before and after attacking on the audio, it is clearly that the standard variance shows good invariant statisti...
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
Abstract. This paper proposes an approach to dynamically reconfiguring service-oriented applications from a business perspective: CAFISEadapt, which defines both business-level and...
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
A widely used technique to overcome the shortage of unique public IP addresses is Network Address Translation (NAT), which hides several hosts behind a single public address. This...
Konstantin Pussep, M. Weinert, Aleksandra Kovacevi...