As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. ...
: “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and managed. Web 2.0 technologies such as blogs, wikis and social networking pla...
Roger Curry, Cameron Kiddle, Nayden Markatchev, Ro...
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...