Abstract. Effective deployment and utilisation of limited and constrained intelligence resources — including sensors and other sources — is seen as a key issue in modern multin...
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Recent work in the field of middleware technology proposes semantic spaces as a tool for coping with the scalability, heterogeneity and dynamism issues arising in large scale dist...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
We extend Tofte and Talpin's region-based model for memory management to support backtracking and cuts, which makes it suitable for use with Prolog and other logic programmin...