Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
— We consider a sensor network in which the sensors communicate at will when they have something to report, without prior coordination with other sensors or with data collection ...
The aim of this work is the design of a framework for the revision of knowledge in abductive reasoning agents, based on interaction. We address issues such as: how to exploit knowl...
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...