Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
In order to analyze the sensitivity of children to RF fields and mobile phones in particular, the SAR (Specific Absorption Ratio) defined as the power absorbed by a unit of mass o...
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...