Issue Date | Title | Author(s) |
2016 | Monitorability of contracts for web services | Vella, Annalizz |
2016 | Dynamic cluster scheduling for ALICE | Napoli, Kevin |
2016 | Performance analysis and auto-tuning of batch thread schedulers | Muscat, Zachariah |
2016 | Predicting spatial relationships for image descriptions | Birmingham, Brandon |
2016 | Automated techniques for mapping CSP-based concurrent programs to compute clusters | Azzopardi, Gabriella |
2016 | Towards modular monitoring for concurrent systems | Attard, Duncan Paul |
2016 | A type-checking approach to ensure monitor correctness | Aquilina Alamango, John |
2016 | Retrieving exploit-level semantics from malicious scripts using program memory analysis | Abela, Robert |
2016 | Investigating ways to mitigate the oracle problem using HCI techniques | Galea, Daniela |
2016 | Implementation and comparison of data embedding algorithms | Formosa, Daniel |
2016 | Cheat detection for games using runtime monitoring | Micallef, Niki |
2016 | Mathematical characterization of music-theoretic structures using Haskell | Teuma, Jeantwan |
2016 | Threat analysis of Microsoft Kerberos ticket misuse | Zerafa, Janet |
2016 | Cloud-based rendering of natural video on mobile devices | Mallia, Mark |
2016 | Communicating sequential processes in distributed JavaScript environments | Micallef, Kurt |
2016 | A domain–specific language for automated testing of iOS applications | Falzon, Jacob |
2016 | Towards offline usage of JavaScript web applications | Degiorgio, Leon |
2016 | Real time object recognition in videos with a parallel algorithm | Azzopardi, Beatrix |
2016 | Threat analysis of ‘Virtual Host Confusion’ on TLS | Bonnici, Kyle |
2016 | Threat analysis of android capability leaks | Cilia, Rachel |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 23