Collaborative authoring is a common workplace task. Yet, despite improvements in word processors, communication software, and file sharing, many problems continue to plague co-aut...
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
The present work presents a cycle-level execution-driven simulator for modern GPU architectures. We discuss the simulation model used for our GPU simulator, based in the concept o...
Workflow technology has reached a reasonable degree of maturity, with a number of both research prototypes and commercial systems available. However, methodological issues have rec...
This paper explores technology permitting arbitrary application components to be exposed for remote access from other software. Using this, the application and its constituent com...
Scott M. Walker, Alan Dearle, Graham N. C. Kirby, ...