Transformations of numerical source code may require the augmentation of the original variables with new data to represent additional data the transformed program operates on. Aut...
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Two practical paradigms are presented, which facilitate domain concepts to be directly used to model business operations: the first paradigm is based on the business artifacts and...
Wei Zhao, Barrett R. Bryant, Fei Cao, Kamal Bhatta...
Complexity of software systems has significantly grown with social dependence on computer system, especially for mobile and internet. So we present component-based communication pr...
Hong-Jun Dai, Tian-Zhou Chen, Chun Chen, Jiang-Wei...
The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrat...
Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Jo...