—We propose a new teletraffic model for the calculation of link occupancy distribution and determine the call blocking probabilities and link utilization in a single-link multi-r...
Vassilios G. Vassilakis, Ioannis D. Moscholios, Mi...
In this paper we present a method of describing microprocessors at different levels of temporal and data abstraction. We consider microprogrammed, pipelined and superscalar proces...
: Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed a...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low-level technology...