There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
The research presented in the literature thus far on process deviations, inconsistencies and general nonconformance have all been very generic, process wide methodologies. Their a...
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
For the realistic simulation of embodied agents we need a model of emotion that represents both structural and dynamic aspects of emotional phenomena to serve as background suppor...
When solving machine learning problems, there is currently little automated support for easily experimenting with alternative statistical models or solution strategies. This is be...
Sooraj Bhat, Ashish Agarwal, Alexander Gray, Richa...