To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
The preemptive real-time scheduling of sporadic parallel task systems is studied. We present an algorithm, called Gang EDF, which applies the Earliest Deadline First (EDF) policy ...
— This paper is concerned with modeling, analysis and optimization/control of occupancy evolution in a large building. The main concern is efficient evacuation of a building in ...
Kun Deng, Wei Chen, Prashant G. Mehta, Sean P. Mey...
National enterprise architectures (NEA) promise to fill the gap between policy and implementation. NEAs are embedded within an institutional environment consisting of active playe...
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...