Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
There are a variety of methods for inducing predictive systems from observed data. Many of these methods fall into the field of study of machine learning. Some of the most effec...
Online newspapers, having existed on the Internet for a couple of years, are now having similar form and content, starting to shape what could be called a genre. We have analyzed ...
We propose the use of surface subdivision as adaptive and higher-order boundary elements for solving a Helmholtz partial differential equation to calculate accurate acoustics sca...