Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
A significant opportunity presented by the availability of high-speed network access in the classroom is the ability to collaborate with remote students and mentors. To be success...
Philip L. Isenhour, John M. Carroll, Dennis C. Nea...
Highly interactive web applications that offer user experience and responsiveness of desktop applications are becoming increasingly popular. They are often composed out of visual...
We introduce a disaster simulation system that supports collaborative planning of disaster measures. While several simulation tools are available for examination and evaluation of...
This paper describes a new collaboration technology that is based on the support of lightweight, informally structured, opportunistic activities featuring heterogeneous threads of...
David R. Millen, Michael J. Muller, Werner Geyer, ...