We present a technique for analyzing a simulation metamodel that has been constructed using a variancestabilizing transformation. To compute a valid confidence interval for the ex...
Maria de los A. Irizarry, Michael E. Kuhl, Emily K...
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
Abstract. Bottom-up approaches, which rely mainly on continuity principles, are often insufficient to form accurate segments in natural images. In order to improve performance, rec...
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
We are advocating a component-oriented software development approach that provides support for a clear separation between the computational and the compositional entities of an ap...