A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
System design often explores optimality of performance. What is optimal is, however, often not predefined or static in most cases, because it is affected by the context of operat...
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
This paper presents HyMoNet, a peer-to-peer hybrid multicast overlay network for efficient live media streaming. The system comprises two parts: service infrastructure and user sp...