: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforce...
Ricardo Corin, Sandro Etalle, J. I. den Hartog, Ga...
Time is one of the most difficult aspects to handle in real world applications such as database systems. Relational database management systems proposed by Codd offer very little ...
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Multiprocessor application performance can be limited by the operating system when the application uses the operating system frequently and the operating system services use data ...
Aleksey Pesterev, Haibo Chen, Lex Stein, M. Frans ...