Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
Despite their potential to reshape business radically, information systems (IS) and information technology (IT) can be key inhibitors of industry transformation. In the automotive...
Mickey Howard, Richard T. Vidgen, Philip Powell, A...
This paper1 introduces a simple model for evolutionary dynamics approaching the “coding threshold”, where the capacity to symbolically represent nucleic acid sequences emerges ...
Piraveenan Mahendra, Daniel Polani, Mikhail Prokop...
Internet service utilities host multiple server applications on a shared server cluster. A key challenge for these systems is to provision shared resources on demand to meet servi...
Ronald P. Doyle, Jeffrey S. Chase, Omer M. Asad, W...
An important issue for federated systems of diverse data sources is optimizing cross-source queries, without building knowledge of individual sources into the optimizer. This pape...