String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
The ability of various ecosystems to perform vital functions such as biodiversity production, and water, energy and nutrient cycling depends on the ecosystem state, i.e. health. E...
Moses Azong Cho, Jan van Aardt, Bongani Majeke, Ru...
The observability of deterministic, discrete-time, switched, linear systems is considered. Depending on whether or not the modes are observed, and on whether the continuous state o...
Abstract. We discuss what constitutes knowledge in pure mathematics and how new advances are made and communicated. We describe the impact of computer algebra systems, automated th...