Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
The process engine for pattern recognition and information fusion tasks, the pepr framework, aims to empower the researcher to develop novel solutions in the field of pattern reco...
Volker Fritzsch, Stefan Scherer, Friedhelm Schwenk...
Model-driven software product lines are an emerging topic in research and industry, as they promise higher development speed and easier adaptability to customer needs. The generat...
Christoph Elsner, Daniel Lohmann, Wolfgang Schr&ou...
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...