Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
A novel high speed, high capacity electron-beam recording technique using nano technology in a Hard Disk Drive form factor is described. The e- beam source is a carbon nanotube...