This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Immersing players in believable and engaging virtual environments is a common goal for many interactive computer games. While PC-based audio only games set in virtual worlds have ...
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...