— In this paper, we propose an adaptive capacity allocation scheme at the call level for a blocked call cleared loss system. The scheme aims to maintain the connection blocking p...
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
We consider the formulation and analysis of a problem of automatic control: correcting for the distortion induced in an optical wave front due to propagation through a turbulent a...
Eric W. Justh, P. S. Krishnaprasad, M. A. Vorontso...