This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Data clustering is a popular approach for automatically finding classes, concepts, or groups of patterns. In practice this discovery process should avoid redundancies with existi...
The main intent of this paper is to address the issue of middleware in network centric operations. To this end, we characterize a set of Information Technology capabilities that s...
Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mou...
The features of ATM offered many attractions to the application community, such as fine-grained multiplexing and high-throughput links. These created considerable challenges for t...
The advancement of GIS data models to allow the eOEective utilization of very large heterogeneous geographic databases requires a new approach that incorporates models of human cog...