As users interact with the world and their peers through their computers, it is becoming important to archive and later search the information that they have viewed. We present De...
Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Sha...
Abstract. This paper presents a method which allows for merging beliefs expressed thanks to logic programming with stable model semantics. This method is based on the syntactic mer...
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Recently there has been a renewed interest in the application of economic models to the management of computational resources. Most of this interest is focused on pricing models f...