Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
— Active perception refers to a theoretical approach to the study of perception grounded on the idea that perceiving is a way of acting, rather than a cognitive process whereby t...
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
System design often explores optimality of performance. What is optimal is, however, often not predefined or static in most cases, because it is affected by the context of operat...
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...