Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
The paper presents the activities and the results of the "Child Observation in school context workshop", an on line course realized during the last academic years at Mac...
Design ECO commonly happens in industry due to constraints or target changes from manufacturing, marketing, reliability, or performance. At each step, designers usually want to mo...
We may view documents, not only as “containers” for information, but also as active participants in organizing and sustaining communities. This paper discusses our experiences...
—This paper presents a novel approach to the design of self-adaptive service-oriented applications based on a new model called service tiles. The approach allows designers to dev...
Luca Cavallaro, Elisabetta Di Nitto, Carlo A. Furi...