The performance of server-side applications is becoming increasingly important as more applications exploit the Web application model. Extensive work has been done to improve the ...
Toyotaro Suzumura, Michiaki Tatsubori, Scott Trent...
Connectors and connector wrappers explicitly specify the protocol of interaction among components and afford the reusable application of extra-functional behaviors, such as reliabi...
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...