The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Recommender systems have changed the way people shop online. Recommender systems on wireless mobile devices may have the same impact on the way people shop in stores. We present o...
Bradley N. Miller, Istvan Albert, Shyong K. Lam, J...
Abstract. A self-organising system functions without central control, and through contextual local interactions. Components achieve a simple task individually, but a complex collec...
Giovanna Di Marzo Serugendo, Noria Foukia, Salima ...
The origin of the study described here is the experiment performed by Basili and Selby, further replicated by Kamsties and Lott, and once again by Wood et al. These experiments inv...