Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
In this paper, we consider the Grand Challenge under a very specific perspective: the enabling of application experts without programming knowledge to reliably model their busines...
Prior to 1994, student registration at Newcastle University involved students being registered in a single place, where they would present a form which had previously been filled ...
Mark C. Little, Stuart M. Wheater, David B. Ingham...
Abstract--We present a robotic manipulation system for automated selection and transfer of individual living cells to analysis locations. We begin with a commonly used cell transfe...
Architectural monitoring and adaptation allows self-management capabilities of autonomic systems to realize more powerful adaptation steps, which observe and adjust not only param...
Thomas Vogel, Stefan Neumann, Stephan Hildebrandt,...