We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Abstract. Efficiency of the first-order logic proof procedure is a major issue when deduction systems are to be used in real environments, both on their own and as a component of ...
Stefano Ferilli, Nicola Di Mauro, Teresa Maria Alt...
Abstract. Information systems engineering for design or knowledge communities is characterized by the fact that these communities constantly monitor themselves and initiate repair ...
Interactive virtual worlds provide a powerful medium for experimental learning and entertainment. Nowadays, virtual environments often incorporate human-like embodied virtual agent...
This study examined a collaborative tool intervention within a geographically-distributed, engineering-design team in a large manufacturing company. Baseline data collection to de...
Elizabeth E. Wierba, Thomas A. Finholt, Michelle P...