Abstract. As Web service-based system integration recently became the mainstream approach to create composite services, the dependability of such systems becomes more and more cruc...
Early detection of problems within a code base can save much effort and associated cost as time progresses. One method of performing routine assessment of code with a view to pre-...
The paper is written jointly by two parties, computer scientists specializing in geovisualization and experts in forestry, who cooperated within a joint project. The authors tell ...
Gennady L. Andrienko, Natalia V. Andrienko, Richar...
In e-business development, semantics-oriented document exchange is becoming important, because it can support crossdomain user connection, business transaction and collaboration. ...
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...