Increasingly, systems are being developed and used in ways that involve end of life issues such as death, dying, and bereavement. Yet design considerations and guidelines for tech...
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
This research explores productive multi-player games as a platform for human-computer agent collaboration. A multiagent perspective is taken to examine the principles of both game...
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...