Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Abstract In this paper, an agent based WLAN/cellular network integrated service model and relevant authentication scheme is proposed. The service model, or solution, does not r...
Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon ...
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Abstract. An open challenge in information distillation is the evaluation and optimization of the utility of ranked lists with respect to flexible user interactions over multiple ...
The queueing Petri net (QPN) paradigm provides a number of benefits over conventional modeling paradigms such as queueing networks and generalized stochastic Petri nets. Using qu...