The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
This paper presents a methodology for interoperability testing based on contextual signatures and passive testing with invariants. The concept of contextual signature offers a fra...
The understanding of human physical and physiological signals and expressions, together with a growing processing and control capacity allows for new approaches in interactive sys...
We study collaborative modeling of business processes with respect to the impact of tool support on the modeling process. For this purpose we compared model quality and modeling c...
This paper focuses on time-based declarative languages. The use of declarative languages has the advantage of their simplicity and gh-level abstraction, usually requiring few or n...
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Component-Based Development(CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we ...
Misook Choi, Injoo J. Kim, Jiman Hong, Jungyeop Ki...