One of the difficulties of using model checkers “in the large” is the management of all (generated) data during the validation trajectory. It is important that the results obta...
This paper presents a comprehensive model for dealing with semantic conflicts in applications, and the implementation of this model in a toolkit for collaborative systems. Conflic...
Face recognition is one of the most challenging biometric modalities for personal identification. This is due to a number of factors, including the complexity and variability of th...
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
In this paper, we report on two user-centric evaluation studies of COPLINK, a suite of criminal data mining and knowledge management applications developed at the University of Ari...
Chienting Lin, Paul J. Hu, Hsinchun Chen, Jennifer...