Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
The design and development of an Interactive Evolutionary Computation (IEC) system needs to take into account the implementation issues found when delivering the system to “Real...
We propose a high-level approach to software architecture that bridges the gap between system requirements (in the problem space) and the architectural design (in the solution spa...
A new tool for computing and visualizing the operation of power system components and systems is presented. One component of the tool is a time domain simulator that operates in t...
A. P. Sakis Meliopoulos, George J. Cokkinides, Ben...