Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
Let S be a set of horizontal line segments, or bars, in the plane. We say that G is a bar visibility graph, and S its bar visibility representation, if there exists a one-to-one c...
Alice M. Dean, William Evans, Ellen Gethner, Joshu...
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
We propose that the trust an agent places in another agent declaratively captures an architectural connector between the two agents. We formulate trust as a generic modality expre...
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...