In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the ...
Fabio Oliveira, Andrew Tjang, Ricardo Bianchini, R...
After a component based system is developed, it has to be deployed into a target environment. As the system becomes much larger and more complex and the environment becomes open an...
Ling Lan, Gang Huang, Liya Ma, Meng Wang, Hong Mei...
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
The focus of this paper reports a collaborative effort with the State of New Jersey in designing and building a human-centered e-government portal to support small and medium size...
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...