The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
—Statistical information extraction (IE) programs are increasingly used to build real-world IE systems such as Alibaba, CiteSeer, Kylin, and YAGO. Current statistical IE approach...
This paper presents the effectiveness of an interactive support facility to tune processor allocation of data-driven realtime programs on CUE (Coordinating Users’ requirements an...