Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
The handwriting is one of the most familiar communication media. Pen based interface combined with automatic handwriting recognition offers a very easy and natural input method. T...
Monji Kherallah, Lobna Haddad, Adel M. Alimi, Amar...
Modern presentation software is still built around interaction metaphors adapted from traditional slide projectors. We provide an analysis of the problems in this application genr...
Leonhard Lichtschlag, Thorsten Karrer, Jan O. Borc...
We provide an overview of an architecture of today's Internet streaming media delivery networks and describe various problems that such systems pose with regard to video codin...
Gregory J. Conklin, Gary S. Greenbaum, Karl Olav L...
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...