Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
The success of stochastic algorithms is often due to their ability to effectively amplify the performance of search heuristics. This is certainly the case with stochastic sampling ...
- Channel-state-aware scheduling strategies on wireless links play an essential role for enhancing throughput performance of elastic data traffic by exploiting channel fluctuatio...
Abstract. This paper describes PARMENIDES, a system which facilitates structured debate about government policy. 1 The PARMENIDES System The last two decades have seen a deliberati...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...