The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Most software-intensive systems rely on a componentbased design and are therefore made up of encapsulated structural units which are hierarchically composed of one another. In thi...
This paper presents the concepts of switching in the Time-Triggered Network-on-Chip (TTNoC), which is the communication subsystem of the Time-Triggered Systemon-Chip (TTSoC) archi...
We present an architectural framework for specifying and processing co-reservations in Grid environments. Compared to other approaches, our co-reservation framework is more genera...
Today, most mobile applications use geo-referenced points of interest (POIs) on location-based maps to call the user’s attention to interesting spots in the surroundings. The pre...