In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
To deal with the increasing complexity of software systems and uncertainty of their environments, software engineers have turned to self-adaptivity. Self-adaptive systems are capab...
Yuriy Brun, Giovanna Di Marzo Serugendo, Cristina ...
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...