Case-Based Reasoning systems usually retrieve cases using a similarity function based on K-NN or some derivatives. These functions are sensitive to irrelevant or noisy features. We...
In this contribution we present a theoretical approach which has been utilized to inform the coordination of the development of complex systems. Coordination is regarded as a form...
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Abstract--Fault localization in enterprise networks is extremely challenging. A recent approach called Sherlock makes some headway into this problem by using an inference algorithm...
Managers of systems of shared resources typically have many separate goals. Examples are efficient utilization of the resources among its users and ensuring no user’s satisfacti...