Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Different classes of information system stakeholders depend on different values to be successful. Understanding stakeholders’ value dependencies is critical for developing softw...
Di Wu, Qi Li, Mei He, Barry W. Boehm, Ye Yang, Sup...
An overview of previous approaches to the visualisation of uncertainty is presented making the distinction between verity visualisation, where the uncertainty information is an in...
In order to better protect and conserve biodiversity, ecologists use machine learning and statistics to understand how species respond to their environment and to predict how they...
— In this paper we present an approach for localizing a sensor network augmented with a mobile robot which is capable of providing inter-sensor pose estimates through its odometr...
David Meger, Dimitri Marinakis, Ioannis M. Rekleit...