Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
This paper describes the starting points of how to design and build tools to help individual users track and monitor their presence on the web from the standpoints of individual p...
Markus Bylund, Jussi Karlgren, Fredrik Olsson, Ped...
We present the design and development of a data stream system that captures data uncertainty from data collection to query processing to final result generation. Our system focuse...
Yanlei Diao, Boduo Li, Anna Liu, Liping Peng, Char...
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for vi...
Aristide Fattori, Roberto Paleari, Lorenzo Martign...
Early detection of process disturbances and prediction of malfunctions in process equipment improve the safety of the process, minimize the time and resources needed for maintenan...
Tiina Komulainen, Mauri Sourander, Sirkka-Liisa J&...