Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Background: Manual curation of biological databases, an expensive and labor-intensive process, is essential for high quality integrated data. In this paper we report the implement...
Early detection of process disturbances and prediction of malfunctions in process equipment improve the safety of the process, minimize the time and resources needed for maintenan...
Tiina Komulainen, Mauri Sourander, Sirkka-Liisa J&...
This paper describes the efforts required to convert conceptual designs and undefined processes for a proposed advanced steel processing shipyard facility into a discrete event si...
Daniel L. Williams, Daniel A. Finke, Deborah J. Me...
The canonical algorithm to enforce box consistency over a constraint relies on a dichotomic process to isolate the leftmost and rightmost solutions. We identify some weaknesses of...