Model-based revision of knowledge bases ex pressed as first-order theories was shown in [Winslett 88b] to be useful as a means of de scribing and reasoning about the effects o...
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...