This paper motivates the need for a formalism for the modelling and analysis of dynamic reconfiguration of dependable real-time systems. We present requirements that the formalism ...
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Supply chain management is a critically significant strategy that enterprises depend on in meeting the challenges of today's highly competitive and dynamic business environme...
Luis Rabelo, Magdy Helal, Chalermmon Lertpattarapo...