Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
A prototype least cost pipeline routing was performed using various data and GIS analysis. Ahvaz-Marun oil pipeline in south west of IRAN was chosen for development of the prototy...
Panda (for Provenance and Data) is a new project whose goal is to develop a general-purpose system that unifies concepts from existing provenance systems and overcomes some limita...
Abstract—A platform-independent communication mechanism is essential for the seamless integration of embedded devices into the Web of Things. Web services provide for such commun...
A number of spatial decision support systems (SDSSs) are already available for the systematic planning of conservation reserves. These existing systems offer varying levels of int...
Neville D. Crossman, Lyall M. Perry, Brett A. Brya...