We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
CARD (Collaborative Analysis of Requirements and Design) is an influential technique for participatory design and participatory analysis that is in use on three continents. This p...
This paper is intended to sum up the results of the Second International Workshop on Software Engineering for Large-Scale Multi-Agent Systems (SELMAS'03) held in Portland, Or...
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
This paper reports on the 2nd Workshop on Model Driven Development of Advanced User Interfaces (MDDAUI’06) held on October 2nd, 2006 at the MoDELS’06 conference in Genova, Ital...
Jan Van den Bergh, Gerrit Meixner, Kai Breiner, An...