This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
A detailed study on the design of decentralized Receding Horizon Control (RHC) schemes for decoupled systems is presented. An optimal control problem is formulated for a set of de...
The paper presents a case study of a large Canadian law firm with a distinctive information culture that is vigorously implementing an information management strategy. Our finding...
Chun Wei Choo, Colin Furness, Scott Paquette, Herm...
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Some students, when working in interactive learning environments, attempt to "game the system", attempting to succeed in the environment by exploiting properties of the s...
Ryan Shaun Joazeiro de Baker, Albert T. Corbett, I...