Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
In information retrieving applications, mobile agents may have to finish their mission before a deadline. Also, there may be some flexibility for the itinerary definition due to o...
— In this work we discuss how the quality of localization knowledge impacts the remote operation of rovers on the surface of Mars. We look at the techniques of localization estim...
Mark W. Powell, Thomas Crockett, Jason Fox, Joseph...
The development of solutions to complex problems requires finding answers to several questions which are obstacles on the road leading to the solution. To perpetuate progress, the...
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
: Data integrity of web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for dat...