Abstract. The aim of this paper is to show how the P systems with replicated rewriting can be modeled by X-machines (also called Eilenberg machines). In the first approach, the par...
Joaquin Aguado, Tudor Balanescu, Anthony J. Cowlin...
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Abstract. Models have been playing a major role in information system engineering and interoperability: in this paper, we put an emphasis on the complementary role of metamodels. M...
It is a challenge to provide an efficient healthcare service for countries with continental dimensions. Mechanisms for a more efficient and better attendance of patients are nec...
The objective of this paper is two-fold. The first is to develop a methodology capable of extracting the Human Values Scale (HVS) from the user, with reference to his/her objective...