Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
While there is a large class
of Multiple-Target Tracking (MTT) problems for which batch
processing is possible and desirable, batch MTT remains relatively
unexplored in comparis...
In this paper, we address the issue of ordering exams by simultaneously considering two separate heuristics using fuzzy methods. Combinations of two of the following three heuristi...
Hishammuddin Asmuni, Edmund K. Burke, Jonathan M. ...
— As there are many good optimization algorithms each with its own characteristics, it is very difficult to choose the best method for optimization problems. Thus, it is importa...
In distributed systems, just as in conventional software, it is often necessary to locate the software components that implement a particular user feature. Several dynamic analysi...