In today’s Internet a user can be adversely affected by other users that overload the router. To address this problem, routers need to provide flow isolation. In this paper, we...
A software development project coordinates work by using work items that represent customer, tester, and developer found defects, enhancements, and new features. We set out to fac...
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
This paper presents a new approach for animating 2D steady flow fields. It is based on an original data structure called the Motion Map. The Motion Map contains not only a dense...