Architecture-based approaches to self-adaptation rely on architectural descriptions to reason about the best way of adapting the structure and behavior of software-intensive syste...
Commoditizing idle computing resources by sharing them in a marketplace has gained increased attention in recent years as a potential disruption to the modern cloud-based service ...
: Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on ...
Maurizio Leotta, Andrea Stocco, Filippo Ricca, Pao...
Game theoretic algorithms have been used to optimize the allocation of security resources to improve the protection of critical infrastructure against threats when limits on secur...
In this paper we have applied the stacking technique on images from a medical device. There is an urgent need in ophthalmology for more cost effective instrumentation for the ear...
Danilo Motta, Luciana de Matos, Amanda Caniatto de...
This paper presents a purely declarative approach to artifactcentric case management systems. Each case is presented as a tree-like structure; nodes bear information that combines...
In the last couple of decades we have witnessed a steady growth in the complexity and widespread of real-time systems. In order to master the rising complexity in the timing behav...
Marco Ziccardi, Martin Schoeberl, Tullio Vardanega
To evaluate the performance of a within-project defect prediction approach, people normally use precision, recall, and F-measure scores. However, in machine learning literature, t...
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed ...
Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-...