—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
Software design techniques emphasize the use of abstractions to help developers deal with the complexity of constructing large and complex systems. These abstractions can also be u...
Brian S. Mitchell, Spiros Mancoridis, Martin Trave...
Conventional object-oriented analysis delivers a business object model, which is transformed during design into collaborating class clusters which implement the business model...
: Within an enterprise various information systems have to be run. Enterprise Application Integration (EAI) has become a well-established way to integrate such heterogeneous busine...
Stefan Gudenkauf, Wilhelm Hasselbring, Felix Heine...