There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
— A planning method for unraveling deformable linear objects based on 2D information about their crossing states is proposed. In manipulation of a linear object, its raveling mus...
We examine how animating a viewpoint change in a spatial information system affects a user's ability to build a mental map of the information in the space. We found that anim...
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...