Abstract. The call for a "focus on content" in ontology research by Nicola Guarino and Mark Musen in their launching statement of the journal Applied Ontology has quite s...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Abstract. Autonomic computing networks manage multiple tasks over a distributed network of resources. In this paper, we view an autonomic computing system as a network of queues, w...
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...
For many small software companies, full-scale software process improvement (SPI) initiatives are often out of reach due to prohibitive costs and lack of SPI knowledge. However, to...