We provide technical details about the software and hardware architecture of SETA, a prototype toolkit for the creation of Web stores which personalize the interaction with custom...
Liliana Ardissono, Anna Goy, Giovanna Petrone, Mar...
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Much work in software architecture has been inspired by work in physical architecture, in particular Alexander’s work on ‘design patterns’. By contrast, Alexander’s work i...
Stephen Rank, Carl O'Coill, Cornelia Boldyreff, Ma...