The development of many complex simulation applications requires collaborative effort from researchers with different domain knowledge and expertise, possibly at different locatio...
Georgios K. Theodoropoulos, Yi Zhang, Dan Chen, Ro...
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
This paper describes a digital theater installation called Buzz. Buzz consists of virtual actors who express the collective voice generated by weblogs (blogs). These actors find ...
Sara Owsley, Kristian J. Hammond, David A. Shamma,...