Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
We present an approach in which the semantics of an XML language is defined by means of a transformation from an XML document model (an XML schema) to an application specific mode...
Abstract. The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new cont...
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...