Locating resources of interest in a large resourceintensive environment is a challenging problem. In this paper we present research on addressing this problem through the developm...
Mehmet S. Aktas, Marlon E. Pierce, Geoffrey Fox, D...
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
Model-driven architectures (MDA) separate the business or application logic from the underlying platform technology and represent this logic with precise semantic models. These mo...
Jana Koehler, Rainer Hauser, Shubir Kapoor, Freder...
Simple retrenchment is briefly reviewed in the B language of J.-R. Abrial [1] as a liberalisation of classical refinement, for the formal description of application developments ...
This paper introduces a Collaborative Virtual Environment (CVE) system over the Internet. A Virtual Reality Modeling Language (VRML) 97-based user interface is developed to permit...