The paper describes the evolution of an Interdisciplinary Concurrent Design Methodology (ICDM) and the metrics used to compare four generations of wearable computer artifacts prod...
Asim Smailagic, Daniel P. Siewiorek, Drew Anderson...
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
: Most cooperation support systems require information about the organisational context in which they are used. This is particularly required when systems are used in a large organ...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...