During software engineering processes lots of artifacts are produced to document the development of a concrete software. For artifacts which are related with respect to their meani...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Resource allocation is a key problem in autonomic computing. In this paper we use a data center scenario to motivate the need for decentralization and cooperative negotiation, and...
Craig Boutilier, Rajarshi Das, Jeffrey O. Kephart,...
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
Unstructured tetrahedral grids are a common data representation of three-dimensional scalar fields. For convex unstructured meshes efficient rendering methods are known. For conca...