Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...
This paper models supply chain (SC) uncertainties by fuzzy sets and develops a possibilistic SC configuration model for new products with unreliable or unavailable SC statistical...
In this paper, we look at the time complexity of two agreement problems in networks of oblivious mobile robots, namely, at the gathering and scattering problems. Given a set of ro...
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...