The rapid progress in high-performance microprocessor design has made it di cult to adapt real-time scheduling results to new models of microprocessor hardware, thus leaving an un...
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
Software Process Improvement, based on a Maturity Level or a Process Capability Profile, from a Capability Maturity Model or an ISO/IEC 15504-based model, is well established in t...
Clenio F. Salviano, Marcia R. M. Martinez, Alessan...
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
This paper explains how Partially Observable Markov Decision Processes (POMDPs) can provide a principled mathematical framework for modelling the inherent uncertainty in spoken di...
Steve Young, Milica Gasic, Simon Keizer, Fran&cced...