Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
To fully leverage the information from different data sources and applications, an enterprise needs a generic, interoperable and flexible infrastructure to integrate and coordinate...
Jingtao Zhou, Shusheng Zhang, Han Zhao, Mingwei Wa...
Abstract. This research aims at promoting sharing of knowledge about functionality of artifacts among engineers, which tends to be implicit in practice. In order to provide a conce...
RPC is one of the programming models envisioned for the Grid. In Internet connected Large Scale Grids such as Desktop Grids, nodes and networks failures are not rare events. This ...