Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Reflecting the rapid growth of information technology, the configuration of software applications, such as word processors and spreadsheets, is both sophisticated and complicate...
TreadMarks is a distributed shared memory DSM system for standard Unix systems such as SunOS and Ultrix. This paper presents a performance evaluation of TreadMarks running on Ultr...
Peter J. Keleher, Alan L. Cox, Sandhya Dwarkadas, ...
Abstract-- This paper describes an overview of our semiautonomous (SA) wheelchair prototype and emphasizes the design of the perceptual navigation system. The goal of our project i...
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...