The class of wireless and mobile networks features a dissimilar set of characteristics and constraints compared to traditional fixed networks. The various dimensions of these char...
Matthias Hollick, Ivan Martinovic, Tronje Krop, Iv...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Recent advances in technology allow multi-agent systems to be deployed in cooperation with or as a service for humans. Typically, those systems are designed assuming individually ...
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, exec...