We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
Ever-changing production campaigns complicate the management of recovery and treatment options for unavoidable effluents at pharmaceutical plants. Each campaign produces large amo...
Aninda Chakraborty, Andres Malcolm, Richard D. Col...
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
A data warehouse (DW) provides an information for analytical processing, decision making, and data mining tools. On the one hand, the structure and content of a data warehouse ref...
Bartosz Bebel, Johann Eder, Christian Koncilia, Ta...
Delivering increasingly complex software-reliant systems demands better ways to manage the long-term effects of shortterm expedients. The technical debt metaphor is gaining signif...
Nanette Brown, Yuanfang Cai, Yuepu Guo, Rick Kazma...