Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct shared meaning during information systems development, implementation and use. ...
Abstract. This paper is centered on the problem of merging (possibly conflicting) information coming from different sources. Though this problem has attracted much attention in pro...
Abstract. This paper introduces an approximate fuzzy representation to FuzzyUCS, a Michigan-style Learning Fuzzy-Classifier System that evolves linguistic fuzzy rules, and studies ...
Albert Orriols-Puig, Jorge Casillas, Ester Bernad&...
We introduce a generic extension of the popular branching-time logic CTL which refines the temporal until and release operators with formal languages. For instance, a language may ...
Roland Axelsson, Matthew Hague, Stephan Kreutzer, ...