By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Abstract. In this paper we use colored Petri nets (CPNs) and the supporting CPN Tools for the modeling and performance analysis of grid architectures. The notation of Petri nets is...
Nikola Trcka, Wil M. P. van der Aalst, Carmen Brat...
We present a procedure for computing the sceptical "ideal semantics" for argumentation in assumption-based frameworks. This semantics was first proposed for logic program...
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
The usability of software in rural environment is difficult for various reasons. Hence, the digital-divide remains between rural and urban population. The local language support, ...
Sree Kumar R., Neelanarayanan Venkataraman, Balaji...