Previous research has shown that method two-way with error for multiple imputation in test and questionnaire data produces small bias in statistical analyses. This method is based...
Joost R. Van Ginkel, L. Andries Van der Ark, Klaas...
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
A nonlinear multiscale technique is used to describe the time history of a spatially homogeneous chain-branching/chain-breaking explosion when chain branching is much faster than c...
Antonio L. Sanchez, Luis L. Bonilla, Manuel Carret...
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...