Abstract—Pervasive applications are characterized by variations in their context of execution. Their correct behavior requires continuous adaptations, accordingly to changes obse...
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
We have developed an individual-based evolving predator-prey ecosystem simulation that integrates, for the first time, a complex individual behaviour model, an evolutionary mecha...
Abstract. Representing an epistemic situation involving several agents obviously depends on the modeling point of view one takes. We start by identifying the types of modeling poin...
—A common simplification in the treatment of random linear channels is the wide-sense stationary and uncorrelated scattering (WSSUS) assumption. For wireless channels, this assu...
Adrian Ispas, Gerd Ascheid, Christian Schneider, R...