Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
We study the case of integrating situational reasoning into a mobile service recommendation system. Since mobile Internet services are rapidly proliferating, finding and using appr...
Marko Luther, Yusuke Fukazawa, Matthias Wagner, Sh...
The paper presents a sketch of a framework-based agile reengineering process, named PARFAIT1 , whose objective is to provide the users with evolved versions of legacy systems, as ...
In a highly dynamic environment, software systems requires a capacity of self-adaptation to fit the environment and the user needs evolution, which increases the software archite...
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...