Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
This paper presents SAAF, a Semantic Accessibility Assessment Framework for personalised Web accessibility assessment procedures. We define four domains as a way to decouple gene...
A concept learning framework for terminological representations is introduced. It is grounded on a method for inducing logic decision trees as an adaptation of the classic tree in...
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
We consider the design of parametric curves from geometric constraints such as distance from lines or points and tangency to lines or circles. We solve the Hermite problem with su...
In this paper we present an optimization solution for power and performance management in a platform running multiple independent applications. Our approach assumes a virtualized ...
Vinicius Petrucci, Orlando Loques, Daniel Moss&eac...
We present an automated ontology matching methodology, supported by various machine learning techniques, as implemented in the system MoTo. The methodology is twotiered. On the ...
We introduce an extension of linear constraints, called linearrange constraints, which allows for (meta-)reasoning about the approximation width of variables. Semantics for linear...
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...