Date Range
Date Range
Date Range
Context-Aware Software Technology and Applications. Recent developments in dynamic programming languages enable context awareness technically, but the application-oriented communities have had little opportunity to benefit from these insights. Vice versa, certain application requirements concerning context could probably be met better by specially-tailored programming and modeling techniques.
Department of Distributed and Dependable Systems. The Department of Distributed and Dependable System is responsible for research and education in the advanced techniques for building reliable component-based software especially in the field of distributed and dependable systems, spanning from smart cyber-physical systems and IoT to cloud-based backends. Our research comprises advanced software architectures, adaptation, model-driven development, model-based testing, formal verification techniques, p.
Focusing on problems of large-scale software maintenance. Member of the Apache Software Foundation. Ernstwhile open source software hacker, particularly Subversion. I tinker in other stuff, too, occasionally. If you are really interested in more details, you can see my résumé.
Previously I was an assistant professor at Universidade Nova de Lisboa, Portugal, and a full-time consultant at ATX Software SA. For some non-professional interests see my sites on games.
We automatically generate software tests, optimized for GUI and code coverage more. Bull; Efficient mutation testing. We extract specifications from classes and apps more.
Associate Professor and Willett Faculty Scholar. University of Illinois at Urbana-Champaign. Urbana, IL 61801, USA. Programming Languages, Formal Methods, and Software Engineering. IEEE Computer Society Distinguished Visitors Program.
Tue 18 October 2016 by Bruno. Malware hunting in Windows kernel. Machine Learning for threat intelligence. Mon 12 September 2016 by hakril. The Story of yet another ransom-fail-ware.
The Story of yet another ransom-fail-ware. Tue 07 June 2016 by PAF. This article explains why it is still worth trying to reverse engineer a ransomware in order to retrieve your encrypted files. Exploiting Windows 2008 Group Policy Preferences. Fri 20 January 2012 by trance. Playing with NFC for fun and coffee. Mon 28 November 2011 by trance. Thu 03 November 2011 by geoffrey. Sun 01 May 2011 by trance.
Esec Perú, NLC y otras empresas dedicadas a la estafa. Como Esec y NLC Encuentran Victimas? Miércoles, 22 de julio de 2009. 1ero- Publican un Anuncio en el Periodico ofreciendo TRABAJO INMEDIATO. 2do- Cuando llegan los postulantes con sus curriculum, deben llenar sus datos y el numero telefonico de 5 contactos o referidos en una hoja. 4to-Siempre piden referidos o contactos.