— With the deployment of large, distributed networks of cameras and other sensors, it is becoming necessary to also address the issue of how to effectively present the large vol...
We report on experience that we made in the Trading room InteGRation Architecture project (TIGRA) at a large German bank. TIGRA developed a distributed system architecture for int...
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
We introduce the Free Factory, a platform for deploying data-intensive web services using small clusters of commodity hardware and free software. Independently administered virtua...
Alexander Wait Zaranek, Tom Clegg, Ward Vandewege,...
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...