Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
Mobile computers, such as cell phones and personal digital assistants (PDAs), have dramatically increased in sophistication. At the same time, the desire of consumers for portabili...
CDS/ISIS is an Integrated Storage and Information retrieval System of United Nations Educational Scientific and Cultural Organization (UNESCO), which is widely used for managing bi...
Stefka Kaloyanova, Gian Luigi Betti, Francesco Cas...
This paper is concerned with the mathematics and formal specification of "set-like" operations for the mixed dimension cellular objects of the Djinn Application Programm...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes
As planning is applied to larger and richer domains the e ort involved in constructing domain descriptions increases and becomes a signi cant burden on the human application desig...