We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
Kinetic (dynamic) typography has demonstrated the ability to add significant emotive content and appeal to expressive text, allowing some of the qualities normally found in film a...
Currently, there is a lack of stand-alone geo-monitoring systems for harsh environments that are easy to configure, deploy and manage, while at the same time adhering to science g...
Igor Talzi, Andreas Hasler, Stephan Gruber, Christ...
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
Web 2.0 is an emerging catch phrase and the applications associated with it shocked the traditional eLearning world. However, is this really all new and can it be considered suitab...
Martin Ebner, Andreas Holzinger, Hermann A. Maurer