We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
Many software applications produced today have a component, of lesser or greater importance to the structure, that is based on database management systems. What is more, this infor...
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also be...