Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approach...
Johannes Oudenstad, Romain Rouvoy, Frank Eliassen,...
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...