Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...
Returns caused by the delivery of incorrect items constitute a major problem for non-automated warehouses. Returns not only create extra costs, they also aggravate customers. Most...
Christian Prause, Markus Eisenhauer, Lukas Gillman...
We propose an umbrella-like device called Funbrella that entertains people with many types of rain by focusing on an umbrella as a user interface that connects humans and rain. Ge...
Kazuyuki Fujita, Yuichi Itoh, Ai Yoshida, Maya Oza...