This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to key...
This paper presents a new method to tackle the feature interaction problem in Internet telephony with the CPL (Call Processing Language) programmable service environment. To cope ...
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
The feature interaction problem occurs when the addition of a new feature to a system disrupts the existing services and features. This paper describes a tabular notation for spec...
Abstract. At the second workshop on feature interactions, we proposed a statebased model for specifying features and proposed reachability-analysis algorithms for detecting various...
Feature interaction detection in the context of systems that are highly integrated into their environment, such as embedded or software-intensive systems, is different from classi...
Abstract. The notion of feature is heavily used in Software Engineering, especially for software product lines. However, this notion appears to be confusing, mixing various aspects...
Andreas Classen, Patrick Heymans, Pierre-Yves Scho...
Form features present a rather attractive building block in computer-aided design environments for a variety of applications, providing the embodiment of engineering semantics in ...
We propose a new model for exible composition of objects et of features. Features are similar to (abstract) subclasses, but only provide the core functionality of a (sub)class. Ove...
Feature interaction is a kind of inconsistent conflict between multiple communication services and considered an obstacle to developing reliable telephony systems. In this paper ...