This study evaluates single-mouse and multiple-mouse configurations for computer-aided learning in schools where access to computers is limited due to resource constraints. Multim...
This paper studies the tracking performance of linear time-invariant multi-variable discrete-time systems. The specific problem under consideration is to track a multi-tone sinus...
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...