This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
This paper shows how some of the TINA principles used in the development of Service Management techniques for the Broadband ISDN may be applied to the management of Internet Servic...
Quincy Cabell, Peter T. Kirstein, Theodore Pagtzis...
Abstract. We present a technique for designing reconfiguration controllers in the Fractal component-based framework. We obtain discrete control loops that automatically enforce saf...