: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
In multi-agent systems, social commitments are increasingly used to capture roles, social norms, the semantics of agent communication as well as other inter-agent dependencies. Th...
Philippe Pasquier, Roberto A. Flores, Brahim Chaib...
Doing agile development in a relatively inelastic environment, where policies and procedures are virtually unchangeable, creates an impedance mismatch between the agile team and i...
Abstract Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A...