Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
Performance monitoring of large scale parallel computers creates a dilemma: we need to collect detailed information to find performance bottlenecks, yet collecting all this data ...
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
This paper proposes modeling the rapidly evolving energy systems as cyber-based physical systems. It introduces a novel cyber-based dynamical model whose mathematical description d...
– In this paper, we evaluate the performance of two candidate formulations for distributed motion planning of robot collectives within an Artificial Potential Field (APF) framewo...