To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets i...
The database community has produced extensive research on the concurrency control problem in the context of traditional databases. However, this traditional model is not suitable ...
Covering arrays can be applied to the testing of software, hardware and advanced materials, and to the effects of hormone interaction on gene expression. In this paper we develop c...
Brahim Hnich, Steven David Prestwich, Evgeny Selen...
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...