Many objects have smooth surfaces of a fairly uniform color, thereby exhibiting shading patterns that reveal information about its shape, an important clue to the nature of the ob...
Peter Nillius, Josephine Sullivan, Antonis A. Argy...
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Run-time management of modern Web-based services requires the integration of several algorithms and mechanisms for job dispatching, load sharing, admission control, overload detec...
This paper discusses the requirements and a generic framework for the integration of architectural and codebased reengineering tools. This framework is needed because there is a l...
Rick Kazman, Steven S. Woods, S. Jeromy Carri&egra...