During the last decades, performance of available hardware resources constantly increased [15], which enabled the assignment of more and more complex tasks to software systems. As...
Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido...
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
Impact analysis – determining the potential effects of changes on a software system – plays an important role in helping engineers re-validate modified software. In previous ...
—Rehabilitation robots, together with vision and audio systems form the multimodal environment for exercising the person in a number of ways, unavoidably influencing the physiolo...
Marko Munih, Domen Novak, Jaka Ziherl, Andrej Olen...
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...