This paper presents a generic methodology to transform a protocol resilient to process crashes into one resilient to arbitrary failures in the case where processes run the same te...
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
The goals of this workshop are: (1) to bring together the community of researchers who are exploring innovative design theories and different design methodologies; (2) to evaluate...
Gerhard Fischer, Elisa Giaccardi, Yunwen Ye, Chris...
Control design and real-time implementation are usually performed in isolation. The effects of the computer implementation on control system performance are still evaluated on the...
In research on musical audio-mining, annotated music databases are needed which allow the development of computational tools that extract from the musical audiostream the kind of ...
Micheline Lesaffre, Marc Leman, Bernard De Baets, ...