Abstract—The integration of semantic representation and retrieval technologies into mainstream web applications depends on the ease of adoption and re-use of existing information...
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Due to the shrinking of feature size and reduction in supply voltages, nanoscale circuits have become more susceptible to radiation induced transient faults. In this paper, we use...
As large shape repositories become more common, the problem of automatically generating good views of shapes has recently gained prominence. However, very few of the proposed meth...
Waqar Saleem, Danyi Wang, Alexander G. Belyaev, Ha...