Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
With the advent of the Web, search has become the prominent paradigm for information seeking, not only across the online space but also within enterprises. Search engine functiona...
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...
Abstract. In the context of Services Oriented Architecture (Soa), complex systems are realized through the design of business–driven processes. Since the design of a complete pro...
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...