Many intelligent user interfaces employ application and user models to determine the user's preferences, goals and likely future actions. Such models require application anal...
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
The design of appropriate communication architectures for complex Systems-on-Chip (SoC) is a challenging task. One promising alternative to solve these problems are Networks-on-Ch...
Holger Blume, Thorsten von Sydow, Daniel Becker, T...
In this study we focus on the specification and assessment of Stochastic Petri net (SPN) models to evaluate the design of an embedded system for reliability and availability. The ...
Frederick T. Sheldon, Stefan Greiner, Matthias Ben...
Large-scale military deployments require transporting equipment and personnel over long distances in a short time. Planning an efficient airlift system is complicated and several ...
Julien Granger, Ananth Krishnamurthy, Stephen M. R...