Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
The software underpinning today’s IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software f...
This experience report describes our efforts to introduce agile development techniques incrementally into our customer’s organization in the National Cancer Institute and develo...
Abstract Process improvement in a large-scale industrial environment is a challenge for numerous reasons. Besides others it is difficult to convince and motivate a critical mass of...
We describe a software development approach for vision that enhances robustness by making novel use of context. Conventional approaches to most image understanding problems suffe...