Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
In this paper, we propose a strategy for the automated and scheduled maintenance of a digital library collection. Existing systems require the user either to add new data manually...
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
We define an extension of the π-calculus with a static type system which supports high-level specifications of extended patterns of communication, such as client-server protocol...
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...