A configuration process is about finding a configuration, a setting, that satisfies the requirements given by the user and constraints imposed by the domain. Feature models are us...
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
We describe a system for the evaluation of the sleep macrostructure on the basis of Emfit sensor foils placed into bed mattress and of advanced signal processing. The signals on wh...
Juha M. Kortelainen, Martin O. Mendez, Anna M. Bia...
In order to contribute to the understanding of how the SPL community and the open source community can benefit from each other, we present the Linux Kernel Configurator (LKC). We ...
This paper shows that a simple two-stage approach to handle non-local dependencies in Named Entity Recognition (NER) can outperform existing approaches that handle non-local depen...