The evaluation of extra-functional properties of embedded systems, such as reliability, timeliness, and energy consumption, as well as dealing with uncertainty, e.g., in the timin...
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Ecological surveys generate large quantities of data database technology has not yet reached its full potential in this area. Here we investigate approaches to modelling ecologica...
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...