Although object-oriented programming techniques have evolved into an accepted technology with recognized benefits for software development, profound investigations of qualitative a...
Abstract. Reactive systems are often modelled as two person antagonistic games where one player represents the system while his adversary represents the environment. Undoubtedly, t...
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
In order for agents and humans to leverage the growing wealth of heterogeneous information and services on the web, increasingly, they need to understand the information that is d...