The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...
Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...