Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
Model-driven engineering (MDE) addresses platform complexity issues by abstracting platformindependent models for subsequent transformation to platform-specific models. This faci...
A new data-driven approach to atmospheric sensing and detecting/ predicting hazardous atmospheric phenomena is presented. Dense networks of small high-resolution radars are deploye...
Jerry Brotzge, V. Chandresakar, Kelvin Droegemeier...