We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric f...
Thomas G. Zimmerman, Joshua R. Smith, Joseph A. Pa...
The success of an executive information system (EIS) depends upon many factors, including providing support for the strategic management process (SMP). The SMP is comprised of fiv...
Sanjay K. Singh, Hugh J. Watson, Richard T. Watson
Graphs are a versatile representation of many systems in computer science, the social sciences, and mathematics, but graph theory is not taught in schools. We present our work on ...
Eric Schweikardt, Nwanua Elumeze, Michael Eisenber...
Timing failures refer to a situation where the environment in which a system operates does not behave as expected regarding the timing assumptions, that is, the timing constraints...