Groundedmodels(Siena2001b)differ fromaxiomatictheories in establishingexplicit connectionsbetweenlanguage andreality that are learnedthroughlanguagegames(Wittgenstein 1953).Thispa...
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
Coupling grid applications developed by different teams requires code modification and high S/W engineering effort. In the Ensemble methodology message passing components are deve...
This paper is concerned with a system that couples the incompressible Navier-Stokes equations to the Vlasov-Fokker-Planck equation. Such a system arises in the modeling of sprays,...