We present an interactive discovery support system, which for a given starting concept of interest, discovers new, potentially meaningful relations with other concepts that have no...
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
—Active probing is an active network monitoring technique that has potential for developing effective solutions for fault localization. In this paper we use active probing to pre...
This paper considers the application of a low-force robotic manipulator to guide a human user’s movement to locate a tool at a predetermined position or to move a tool along a p...
This paper explores the suitability of UML techniques for defining hierarchical relationships in AMS (analogue and mixed-signal) circuit blocks, and XML for storing soft AMS IP de...
Ian O'Connor, Faress Tissafi-Drissi, G. Revy, Fr&e...