Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
The problem of designing suitable conceptual modeling languages for system engineering is far from being solved. In the past years, some works have proposed the use of foundational...
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
This paper discusses information fusion methodologies, selection of one of these methodologies, and application of these fusion methodologies to underwater sonar simulation. Bayes...
Yanshen Zhu, Maria Bull, Haluk M. Akin, José...
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...