High quality is one of the critical elements contributing to Web service’s success. Monitoring events that are sensitive to quality of Web services is thus an important issue fo...
Intentional agent systems are increasingly being used in a wide range of complex applications. Capabilities has recently been introduced into some of these systems as a software en...
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
Thanks to the major evolutions in the communication technologies and in order to deal with a continuous increase in systems complexity, current applications have to cooperate to ac...
Mohammed Nadhmi Miladi, Fatma Krichen, Mohamed Jma...
To date, most clone detection techniques have concentrated on various forms of source code analysis, often by analyzing token streams. In this paper, we introduce a complementary ...