We have recently proposed a general approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour in systems employing an OTS (Off-The-Shelf) ite...
Tom Anderson, Mei Feng, Steve Riddle, Alexander B....
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
This paper presents a model of estimating the similarity of software artifacts so as to promote their analogical reuse. The model permits comparisons between artifacts developed a...
Design of accessible applications is often a challenge for software architects and developers. Development usually starts with structure and functionality of the planned applicati...
: The need for support of multi-user interaction is growing in several application domains, including the Web. However, there is a lack of tools able to support designers and devel...