Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
We examine the use of Web services, an XML-based distributed object system, for developing reusable, interoperable services for computational science web portals. This paper descr...
Stephen Mock, Choon-Han Youn, Marlon E. Pierce, Ge...
Previous works on automatic query clustering most generate a flat, un-nested partition of query terms. In this work, we are pursuing to organize query terms into a hierarchical s...
In the present paper a system for generation of topological maps is going to be presented. This system is considered as one of the deliberative skills of the mobile robots architec...
Object-oriented programming, design patterns, and frameworks are common techniques that have been used to reduce the complexity of sequential programming. We have applied these te...
John Anvik, Steve MacDonald, Duane Szafron, Jonath...