Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Abstract. There have been some Artificial Intelligence applications developed for electronic circuits diagnosis, but much remains to be done in this field, above all in the analo...
While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining in...
Available methodologies for developing Sematic Web applications do not fully exploit the whole potential deriving from interaction with ontological data sources. Here we introduce...