We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
: Processes usually are defined according to underlying standards (ISO 15504, ESA ECSS, ISO 9001, ...) and are described with process steps to be performed by roles and producing r...
Richard Messnarz, Damjan Ekert, Michael Reiner, Ge...
Abstract—The application of neural networks (NN’s) to automatic analysis of chromosome images is investigated in this paper. All aspects of the analysis, namely segmentation, f...
We present a supervised classification model based on a variational approach. This model is specifically devoted to textured images. We want to get a partition of an image, compos...
The number of Web-databases has exploded during the last years. In order to justify the development of new information resources, it is essential to know if the use of existing re...