We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Wireless Sensor Networks (WSNs) are currently emerging as one of the most disruptive technologies enabling and supporting next generation ubiquitous and pervasive computing scenari...
Abstract-- We present a new method for automatic segmentation of heterogeneous image data that takes a step toward bridging the gap between bottom-up affinity-based segmentation me...
Jason J. Corso, Eitan Sharon, S. Dube, Suzie El-Sa...
We present a framework for validating the compliance of a design with a given architecture. Our approach is centered on the concept of misinterpretations. These include missing be...
In this paper, the automatic customization of an agent-based medical system is approached by means of ontologies. The particular case of Home Care studied and developed in the EU K...