This paper investigates how maintainability can be established in system integration (SI) projects where maintainers have no direct access to the source code of the third-party so...
When building a new spoken dialogue application, large amounts of domain specific data are required. This paper addresses the issue of generating in-domain training data when litt...
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Large and complex computer based systems are the result of an evolution process which may take many years. Heterogeneity is an important characteristic of such systems: During the...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...