Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
— This research proposes a method for producing music via visual composition in a computer-game like environment. This is accomplished through the development of artificial intel...
Efficient communication in Bluetooth scatternets requires design of intra and inter-piconet scheduling algorithms, and therefore numerous algorithms have been proposed. However, du...
Modeling in systems biology is concerned with using experimental information and mathematical methods to build quantitative models at different biological scales. This requires int...
Zhouyang Sun, Anthony Finkelstein, Jonathan Ashmor...
d Abstract) Vladimiro Sassone1 , Karl Krukow2 , and Mogens Nielsen2 1 ECS, University of Southampton 2 BRICS , University of Aarhus We define a mathematical measure for the quantit...