There are many different approaches to elicit requirements each having its strengths and weaknesses. Hence, some approaches may be ore suitable to one domain then another. Moreove...
The development of small wireless sensors and smart-phones, which include various sound, video, motion and location sensors have facilitated new pervasive applications. These perva...
Themistoklis Bourdenas, Morris Sloman, Emil C. Lup...
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Model-based development promises to increase productivity by offering modeling languages tailored to a specific domain. Such modeling languages are typically defined by a metamodel...
In this paper we propose an automatic updating system for urban vector maps that is able to detect changes between the old dataset (consisting of both vector and raster maps) and t...
S. Ceresola, Andrea Fusiello, Manuele Bicego, Albe...