This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
In this paper we consider data freshness and overload handling in embedded systems. The requirements on data management and overload handling are derived from an engine control so...
Abstract Complex systems call for a hierarchical description. Analogously, the engineering of non-trivial MASs (multiagent systems) requires principles and mechanisms for a multi-l...
Ambra Molesini, Andrea Omicini, Alessandro Ricci, ...
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...