The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
Processes and techniques for the development of enterprise software are best served when infused with practical experience. Pragmatic reflection on what works and what doesn'...
This paper presents an approach to defining component-based software architectures in which interfaces rather than components play the key role. Architectural descriptions are bui...
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...