Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Merging and integrating different conceptual models which have been developed by domain experts and analysts with dissimilar perspectives on the same issue has been the subject of...
Efficient discovery and resource allocation is one of the challenges of current Peer-to-Peer systems. In centralized approaches, the user requests can be matched to the fastest, ch...
Oscar Ardaiz, Pau Artigas, Torsten Eymann, Felix F...
Since different systems have different success-critical stakeholders, and these stakeholders depend on the system in different ways, using traditional one-size-fits-all dependabili...
Multichannel adaptive information systems can deliver services over different types of networks and access devices. Since different providers may offer either functionally equivale...
Cinzia Cappiello, Paolo Missier, Barbara Pernici, ...