To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
One of the objectives of e-Research is to help scientists to accomplish their research, including scientific experiments, more effectively and efficiently. Web services provide ...
Donglai Zhang, Paul D. Coddington, Andrew L. Wende...
Abstract. This paper presents a framework for supporting the optimization of Java programs using attributes in Java class files. We show how class file attributes may be used to ...
The BankXX system models the process of perusing and gathering information for argument as a heuristic best-first search for relevant cases, theories, and other domain-specific in...
Edwina L. Rissland, David B. Skalak, M. Timur Frie...
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...