This paper describes a monitoring environment that enables the analysis of memory access behavior of applications in a selective way with a potentially very high degree of detail. ...
Edmond Kereku, Tianchao Li, Michael Gerndt, Josef ...
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
The unique value of cultural heritage has long been recognized together with the need for accurate and detailed information in order to preserve and manage cultural heritage materi...
Alexia Dini Kounoudes, Petros Artemi, Marios Zerva...
This paper presents the design of an open architecture for heterogeneous negotiating agents. Both the system level architecture as well as the architecture for negotiating agents a...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
Learning path construction is a complex task. It involves formulating and organizing learning activities, defining ways to evaluate student learning progress and to match such prog...