Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
By considering the spatial character of sensor-based interactive systems, this paper investigates how discussions of seams and seamlessness in ubiquitous computing neglect the com...
Stuart Reeves, Tony P. Pridmore, Andy Crabtree, Jo...
Visual Query Languages represent an evolution, in terms of understandability and adaptability, with respect to traditional textual languages. We present an iconic query system tha...
Lerina Aversano, Gerardo Canfora, Andrea De Lucia,...
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...