Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
This paper reports on a case study conducted to guide the design and implementation of a group support system. Network analysis of student self-reported interactions was conducted...
Ling Xia, N. Sadat Shami, Y. Connie Yuan, Geri Gay
The recent emergence of web mash-ups and open source software is driving the development of new practices in software and systems development. In this paper we explore novel pract...
Ingbert R. Floyd, M. Cameron Jones, Dinesh Rathi, ...
— Motion safety for robotic systems operating in the real world is critical (especially when their size and dynamics make them potentially harmful for themselves or their environ...