Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
We report on random stimuli generation for hardware verification in IBM as a major application of various artificial intelligence technologies, including knowledge representation,...
Yehuda Naveh, Michal Rimon, Itai Jaeger, Yoav Katz...
This paper introduces a new class called hang yourself (HY) arguments into the theory of defeasible argumentation. The novelty of such arguments is that they are inherently destru...
— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability w...
Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying...