In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Multi-agent systems comprise multiple, deliberative agents embedded in and recreating patterns of interactions. Each agent’s execution consumes considerable storage and calculat...
The architecture of software systems is known to decay if no counter-measures are taken. In order to prevent this architectural erosion, the conformance of the actual system archi...
Florian Deissenboeck, Lars Heinemann, Benjamin Hum...
We present a novel system that is capable of generating live dense volumetric reconstructions based on input from a micro aerial vehicle. The distributed reconstruction pipeline i...
Andreas Wendel, Michael Maurer, Gottfried Graber, ...