Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Tasks like diagnosis, failure-modes-and-effects analysis (FMEA), and therapy proposal involve reasoning about variables and parameters deviating from some reference state. In model...
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
We are building a system that can automatically acquire 3D range scans and 2D images to build geometrically and photometrically correct 3D models of urban environments. A major bo...
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...