This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Today's requirements engineering approaches focus on notation and techniques for modeling the intended functionality and qualities of a software system. Little attention has ...
AbstrAct A comprehensive overview of numerical methodologies currently available for analyzing and building understanding of complex processes is presented. Both equation-free and ...
We present the results of a three year field study of the software development process choices made by project teams at two leading offshore vendors. In particular, we focus on th...
The paper presents a first prototype of a handheld museum guide delivering contextualized information based on the recognition of drawing details selected by the user through the ...