This paper approaches the issue of coordination of highly autonomous Automated Guided Vehicles (AGVs) working on an automated factory. These vehicles are used for goods delivery t...
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...