We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
Abstract. Recently, component-based application developments to improve the software productivity and reusability have attracted our attention. The components are parts for buildin...
— Impairments in wireless data communication due to time and location dependent errors can be overcome by using channel-adaptive techniques, like channel-aware scheduling or adap...