Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
This paper deals with energy-aware real-time system scheduling using dynamic voltage scaling (DVS) for energy-constrained embedded systems that execute variable and unpredictable ...
A critical point for developing successful information systems for distributed organisations is the need for integrating heterogeneous technologies and tools. This paper reports a...
Lerina Aversano, Gerardo Canfora, Andrea De Lucia,...
Research efforts focused on developing "active reports" are currently underway. Active reports are designed to foster communication among teachers, students, and parents ...
Diego Zapata-Rivera, Eric G. Hansen, Valerie J. Sh...