Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Though adjustable autonomy is hardly a new topic in agent systems, there has been a general lack of consensus on terminology and basic concepts. In this paper, we describe the mul...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
Think Like a Commander – Excellence in Leadership (TLAC-XL) is an application designed for learning leadership skills both from the experiences of others and through a structure...
Randall W. Hill Jr., Jay Douglas, Andrew Gordon, F...