In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
This work presents the first worst-case execution times (WCET) analysis of MPEG-decoding. Solutions for two scenarios (Video-on-Demand (VoD), live) are presented, serving as exam...
Peter Altenbernd, Lars-Olof Burchard, Friedhelm St...
The use of causal rules or fluent dependency constraints has proven to provide a versatile means of dealing with the ramification problem. In this paper we show how fluent depende...
This paper presents a Knowledge Base System (KBS) as a key component of a federated simulation framework which allows the investigation of (inter)dependencies among Critical Infra...
Elisa Castorini, Paolo Palazzari, Alberto Tofani, ...
The aim of this paper is to show a method that is able to detect inconsistencies in the reasoning carried out by a deliberative agent. The agent is supposed to be provided with a h...