Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Accurately estimating the cardinality of aggregate views is crucial for logical and physical design of data warehouses. While the warehouse is under development and data are not a...
This paper investigates an attempt to combine different simulation tools in order to build a simulation environment that can be used to model complex system behaviour. The compone...
There are many planning applications that require an agent to coordinate its activities with processes that change continuously over time. Several proposals have been made for com...