Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
This paper describes the architecture of a data level comparative visualization system and experiences using it to study computational fluid dynamics data and experimental wind tu...
— We present an integral feedback controller that regulates the average copy number of a particular assembly in a system of stochastically interacting robots. The mathematical mo...
Background: Computational biology is often associated with genetic or genomic studies only. However, thanks to the increase of computational resources, computational models are ap...
Traffic engineering of IP networks requires the characterization and modeling of network traffic on multiple time scales due to the existence of several statistical properties that...