In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
Louisiana State University’s Biomedical Research Center is going through a major expansion in reaching its 5 year strategic plan. With expansion comes an opportunity to “get t...
Timely and cost-effective processing of large datasets has become a critical ingredient for the success of many academic, government, and industrial organizations. The combination...
—In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as Mobile Offshore Drilling Units. In a typical in...
— In this paper we give conditions that a discrete time switched linear systems must satisfy if it is stable. We do this by calculating the mean and covariance of the set of matr...