Pervasive devices are becoming popular and smaller. Those mobile systems should be able to adapt to changing requirements and execution environments. But it requires the ability t...
Daniel Cheung-Foo-Wo, Jean-Yves Tigli, Stephane La...
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
A goal of the Geosciences Network (GEON) is to develop cyber-infrastructure that will allow earth scientists to discover access, integrate and disseminate knowledge in distributed...
Leonardo Salayandia, Paulo Pinheiro da Silva, Ann ...
This paper reports on a project establishment undertaking as proposed by the STEPS methodology (Software Technology for Evolutionary Participatory System Design). Project establis...