A large class of applications require real-time processing of continuous stream data resulting in the development of data stream management systems (DSMS). Since many of these app...
Weihan Wang, Mohamed A. Sharaf, Shimin Guo, M. Tam...
Developing and managing applications for environments consisting of independently congured computing systems interoperating acrossnetwork connections is of considerable interest ...
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...
In a number of application areas, distributed database systems can be used to provide persistent storage of data while providing efficient access for both local and remote data. W...
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...