Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Civilian applications for UAVs will bring these vehicles into low flying areas cluttered with obstacles such as building, trees, power lines, and more importantly civilians. The h...
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
1 A knowledge acquisition process that has been implemented by a virtual team for the development of a knowledge based early warning system in Material Recovery Facilities (MRFs) o...
Ioannis M. Dokas, Konstantinos Kitis, Christos Dod...