Libraries increasingly play an integral role as service providers in E-Government systems, but little has been done to assess the scope or trajectory of citizen needs in libraries...
Amelia N. Gibson, John Carlo Bertot, Charles R. Mc...
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
Managing uncertainty on the Semantic Web can potentially improve the ontology mapping precision which can lead to better acceptance of systems that operate in this environment. Fur...
Abstract— With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open p...
Abstract. Designing systems of asynchronous web services is challenging. Addressing the design in terms of component reuse helps address important questions that need to be answere...