In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
In Information Visualization, adding and removing data elements can strongly impact the underlying visual space. We introduce a chess board analogy for displaying (projecting) obj...
Roberto Pinho, Maria Cristina Ferreira de Oliveira...
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
This paper presents a new exploration mechanism based on a heterogeneous multi-agent system that combines attractive and repulsive agents. We provide experimental results about th...
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
Port automata are an operational model for component connectors in a coordination language such as Reo. They describe which sets of ports can synchronize in each state of the conn...