There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
There are many good reasons why organizations should perform software architecture reconstructions. However, few organizations are willing to pay for the effort. Software architec...
This paper presents configuration methods for an existing neuromorphic hardware and shows first experimental results. The utilized mixed-signal VLSI1 device implements a highly a...
As software processes for developing eGovernment services become more complex, it is necessary to provide computer-based tools to support the software engineering process. Furtherm...
An important aspect of developing models relating the number and type of faults in a software system to a set of structural measurement is defining what constitutes a fault. By de...