Software development and testing of Enterprise Resource Planning (ERP) systems demands dedicated methods to tackle its special features. As manual testing is not able to systematic...
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
A map series of 1920s Mytilene town, property of Lesvos Archives, had been inaccessible due to its poor condition. One map of this series was restored, scanned, digitised and given...
Behavior generation in humans and animals usually employs a combination of bottom-up and top-down patterns. Most available robotic architectures utilize either bottom-up or top-dow...
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...