—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...
The use of redundant computational nodes is a widely used design tactic to improve the reliability of complex embedded systems. However, this redundancy allocation has also an effe...
In this paper, we introduce a new instance-based approach to the label ranking problem. This approach is based on a probability model on rankings which is known as the Mallows mode...
Background: A widely-used approach for discovering functional and physical interactions among proteins involves phylogenetic profile comparisons (PPCs). Here, proteins with simila...
Reliable and efficient perception and reasoning in dynamic and densely cluttered environments are still major challenges for driver assistance systems. Most of today's system...