Managing the architectural description (AD) of a complex software system and maintaining consistency among the different models is a demanding task. To understand the underlying p...
Most currently used e-Learning Systems do not often offer search functionality. Even if methods are provided to search for Learning Objects (LOs), they don’t usually utilize info...
Tomasz Orzechowski, Sebastian Ernst, Andrzej Dziec...
– In this paper, we present a general mathematical foundation of hormone-inspired control for the selfreconfigurable robotic system. Problem considered here is the lack of a math...
Thanks to the continuous growth of collaborative platforms like YouTube, Flickr and Delicious, we are recently witnessing to a rapid evolution of web dynamics towards a more `soci...
Cataldo Musto, Fedelucio Narducci, Marco de Gemmis...
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...