As the technical infrastructure to support Grid environments matures, attention must be focused on integrating such technical infrastructure with technologies to support more dynam...
Ronald Ashri, Terry R. Payne, Michael Luck, Mike S...
Intense competition in many industries impels firms to develop more products in less time. Overlapping of development activities is regarded as one of the most promising strategie...
Jun Lin, Kah Hin Chai, Yoke San Wong, Aarnout Brom...
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...