Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Most approaches in reverse engineering literature generate a single view of a software system that restricts the scope of the reconstruction process. We propose an orchestrated se...
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
This paper presents an analysis of feature-oriented and aspectoriented modularization approaches with respect to variability management as needed in the context of system families...
In this paper, we describe the GroupMedia system, which uses wireless wearable computers to measure audio features, headmovement, and galvanic skin response (GSR) for dyads and gr...