We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Abstract. Efficiency of the first-order logic proof procedure is a major issue when deduction systems are to be used in real environments, both on their own and as a component of ...
Stefano Ferilli, Nicola Di Mauro, Teresa Maria Alt...
This study examined a collaborative tool intervention within a geographically-distributed, engineering-design team in a large manufacturing company. Baseline data collection to de...
Elizabeth E. Wierba, Thomas A. Finholt, Michelle P...
Software miniaturization is a form of software refactoring focused on reducing an application to the bare bone. Porting an application on a hand-held device is very likely to requ...
Massimiliano Di Penta, Markus Neteler, Giuliano An...