Recently, there has been much interest in developing analyzes to detect concurrency bugs that arise because of data races, atomicity violations, execution omission, etc. However, ...
Dasarath Weeratunge, Xiangyu Zhang, William N. Sum...
An applied research for the incremental evolution of a service oriented architecture for local eGovernment portals has been developed. Our reference eGovernment environment, curre...
Antonio Candiello, Andrea Albarelli, Agostino Cort...
Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
: Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements Hamid R. Motahari-Nezhad, Sven Graupner, Sharad Singhal HP Laboratories HPL...
Hamid R. Motahari Nezhad, Sven Graupner, Sharad Si...