The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
This paper presents a code-revision history collection and visualization Eclipse plugin for use in empirical studies of programmers. The revision history is collected non-intrusiv...
While research on cross-layer network optimization has been progressing, useful implementations have been lagging because the current Internet architecture does not accommodate cro...
Ilia Baldine, Manoj Vellala, Anjing Wang, George N...
This paper presents an overview of an assembler driven verification methodology (ADVM) that was created and implemented for a chip card project at Infineon Technologies AG [2]. Th...
This paper focuses on a grammar-based approach to semantic interpretation, which combines the notions of robust and weighted parsing. In restricted domains of application in infor...