Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
In the 1980s process algebras became widely accepted formalisms for describing and analysing concurrency. Extensions of the formalisms, incorporating some aspects of systems which...
Abstract. This paper studies the problems related to mobile connectivity on a wireless environment with Mobile IPv6, specially the handover, which is the most critical part. The ma...
The co-evolution of business processes and supporting software systems is needed for keeping them aligned and it requires managerial and technological effort for adequately plannin...
In this paper, two tools are presented: an execution driven cache simulator which relates event metrics to a dynamically built-up call-graph, and a graphical front end able to visu...
Josef Weidendorfer, Markus Kowarschik, Carsten Tri...