Abstract. This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not ...
Malware (Malicious Software) of Windows OS has become more sophisticated. To take some countermeasures for recent infection, more intelligent and automated system log analysis is n...
In this paper we present an algorithm for parallel exhaustive search for short vectors in lattices. This algorithm can be applied to a wide range of parallel computing systems. To ...
Jens Hermans, Michael Schneider 0002, Johannes Buc...
– Object-Oriented Analysis (OOA) has been proposed and applied in software engineering for more than fifteen years. Many researchers and practitioners have published many article...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...