Efficient exploitation of the aggregate resources available to a researcher is a challenging and real problem. The challenge becomes all the greater when researchers who collaborat...
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Many end user programming tools lack adequate support for domain-specific data. We will design a lightweight representation for categories of data, called “topes,” and develop...
The use of today’s multicluster grids exhibits periods of submission bursts with periods of normal use and even of idleness. To avoid resource contention, many users employ obse...
Omer Ozan Sonmez, Bart Grundeken, Hashim H. Mohame...