—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
We address the problem of users creating visualizations to debug and understand multi-agent systems. The key challenges are that (1) needs arise dynamically, i.e., it is difficult...
Jing Jin, Rajiv T. Maheswaran, Romeo Sanchez, Pedr...
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
During the last decades eGovernment has been a vivid, dynamic research and development area. As services are being transformed, electronic documents and web services appear every d...
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...