In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
Conventional methods for state space exploration are limited to the analysis of small systems because they suffer from excessive memory and computational requirements. We have dev...
William J. Knottenbelt, Peter G. Harrison, Mark Me...
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...