The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
Forms-based user interfaces are widely used means for human-computer interaction. However, it is difficult to exploit software reuse in forms-based systems because the systems ten...
With the increasing adoption of Java for parallel and distributed computing, there is a strong motivation for enhancing the expressive elegance of the RMI paradigm with flexible ...
Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam...
UML activity models (activities, for short) have become widely accepted for specifying the dynamic behavior of use cases. For an adequate specification of use cases in the context...
When using Learning Object Repositories, it is interesting to have mechanisms to select the more adequate objects for each student. For this kind of adaptation, it is important to...
Cristina Carmona, Gladys Castillo, Eva Millá...