Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Current web search engines essentially conduct document-level ranking and retrieval. However, structured information about realworld objects embedded in static webpages and online...
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...
The Wine Agent is a demonstration system that uses an underlying domain ontology to provide suitable wines for a given meal. In doing so it serves as a testbed, not only for the l...