Many techniques exist for analyzing information domains in preparation for systems design. No systematic technique exists, however, for analyzing a system or domain in terms of it...
Analyzing data obtained from web server logs, so-called “clickstreams”, is rapidly becoming one of the most important activities for companies in any sector as most businesses...
Jesper Andersen, Anders Giversen, Allan H. Jensen,...
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
The standard design of control systems is based on the periodic sampling. Every period the data is read from the input, the control law is computed, and the output is written to t...
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...