This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also ...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
A computational composite is a material in which computations contribute to the properties of the material through their capability to control transitions between states in the oth...
Over the past decade, it has been established that a good education in software engineering requires a specialized program of study different from traditional computer science prog...
Abstract. The deployment of agent societies —as complex systems— in dynamic and unpredictable settings brings forth critical issues concerning their design. Organizational mode...
Loris Penserini, Virginia Dignum, Athanasios Staik...