To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Distributed real-time systems require a predictable and verifiable mechanism to control the communication medium. Current real-time communication protocols are typically independe...
—In the framework of the European Integrated Project PALETTE, the École Polytechnique Fédérale de Lausanne (EPFL) is developing the eLogbook Web 2.0 social software. The purpo...
Denis Gillet, Sandy El Helou, Chiu-Man Yu, Christo...
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...