This paper presents a European Master programme on Global Software Engineering (SE), being put forward by four leading institutions from Sweden, UK, Netherlands and Italy. The Glo...
Patricia Lago, Henry Muccini, Ljerka Beus-Dukic, I...
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
During the development of computer peripherals which interface to the processor via the system bus it is often necessary to acquire the signals on the bus at the hardware level. I...
H. A. Xie, Kevin E. Forward, K. M. Adams, D. Leask