A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Akey question in conditional planning is: howmany, and whichof the possible executionfailures shouldbe plannedfor? Onecannot, in general, plan for all the possiblefailures because...
The unfold/fold transformation system defined by Tamaki and Sato was meant for definite programs. It transforms a program into an equivalent one in the sense of both the least tter...
Many development teams have successfully used Agile Development to build quality software, but often these projects have failed to effectively contribute to overall company succes...
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...