Abstract: The present contribution deals with the experiences of introducing a modelbased software development method for device driver families used in electronic control units in...
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Many of existing criteria for evaluating web sites quality require methods such as heuristic evaluations, or/and empirical usability tests. This paper aims at defining a quality m...
One of the main challenges for privacy-aware locationbased systems is to strike a balance between privacy preferences set by users and location accuracy needed by Location-Based S...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
It is now common to encounter communities engaged in the collaborative analysis and transformation of large quantities of data over extended time periods. We argue that these comm...