The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementat...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
This paper contributes to the design of Groupware Calendar Systems (GCSs) for use in domestic life. We consider a number of ethnographic studies of calendar use in domestic circums...
Andy Crabtree, Terry Hemmings, Tom Rodden, John A....
This paper discusses an on-line Tasks Assignment and Routing Problem(TARP) for Autonomous Transportation Systems(ATSs) in manufacturing systems. The TARP results in a constrained ...