Component based development of software systems needs to devise effective test management strategies in order fully achieve its perceived advantages of cost efficiency, flexibility...
Daniel Sundmark, Jan Carlson, Sasikumar Punnekkat,...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Most approaches to event extraction focus on mentions anchored in verbs. However, many mentions of events surface as noun phrases. Detecting them can increase the recall of event ...
Cassandre Creswell, Matthew J. Beal, John Chen, Th...
Discrete temporal transitions occur in a variety of domains, but this work is mainly motivated by applications in molecular biology: explaining and analyzing observed transcriptome...
High-end mobile phones are quickly becoming versatile sensing platforms, capable of continuously capturing the dynamic context of their owners through various sensors. A change in...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...