As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Open source intelligence analysts routinely use the web as a source of information related to their specific taskings. Effective information gathering on the web, despite the prog...
To enable optimizations in memory access behavior of high performance applications, cache monitoring is a crucial process. Simulation of cache hardware is needed in order to allow...
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...