Recognizing that trust states are mental states, this paper presents a formal analysis of the dynamics of trust in terms of the functional roles and representation relations for tr...
Tibor Bosse, Catholijn M. Jonker, Jan Treur, Dmytr...
Although Moore’s Law enables a huge number of components to be integrated into a single chip, design methods that will allow system architects to put the components together to ...
In multimedia and other streaming applications a significant portion of energy is spent on data transfers. Exploiting data reuse opportunities in the application, we can reduce th...
Ilya Issenin, Erik Brockmeyer, Miguel Miranda, Nik...
three levels of abstraction in system modeling. Computation Independent Model (CIM) corresponds to the system's domain model and is similar to the domain ontology. It does not...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...