: Many methods in the area of Human-Computer Interaction have been developed for deriving user interfaces considering individual users. However, nowadays information systems includ...
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
formation driven paradigm that tends to fail in capturing suitable abstraction when developing conference-oriented telemedicine systems for assisting the proceeding of telemedicine...
In this paper, we present a model-driven methodology and toolset for automatic generation of hypertext system repositories. Our code generator, called Bamboo, is based on a Contai...
The development of on line model-based fault detection systems in machinery improves the operational reliability of industrial systems and reduces the operational and maintenance ...