This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Large-scale storage systems often hold data for multiple applications and users. A problem in such systems is isolating applications and users from each other to prevent their wor...
Theodore M. Wong, Richard A. Golding, Caixue Lin, ...
Systems that use or serve multimedia data require timely access to data on hard drives. To ensure adequate performance users must either prevent overload of disk resources, or use...
The success of an executive information system (EIS) depends upon many factors, including providing support for the strategic management process (SMP). The SMP is comprised of fiv...
Sanjay K. Singh, Hugh J. Watson, Richard T. Watson