: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
This paper presents ongoing research on human-computer interaction in virtual environments using voice recognition systems. The paper starts describing voice recognition technologi...
For extended enterprises, value-chain integration means that enterprise business systems can no longer be confined to internal processes, applications, and data repositories. What...
Research problems in ICT networks often comprise coordination problems of information infrastructures and require state-of-the-art methods of coping with complex system dynamics. ...
The research concerning Java’s semantics and proof theory has mainly focussed on various aspects of sequential sub-languages. Java, however, integrates features of a class-based ...