Traditionally, negotiation support was based on normative and prescriptive research; its users were analysts and experts. The purpose of the recently developed e-negotiation syste...
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
The automotive engine performance is greatly affected by the calibration of its electronic control unit (ECU). The method for ECU calibration is traditionally done by trial-and-er...