Industrial databases often contain a large amount of unfilled information. During the knowledge discovery process one processing step is often necessary in order to remove these ...
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
This paper examines whether the ability to reuse a simulation, in whole or in part, results in tangible cost savings on the overall economics of the original simulation. Specific ...
Software evolution and reuse is more likely to receive higher payoff if high-level artifacts—such as architectures and designs—can be reused and can guide low-level component ...
This paper presents an approach for authoring training applications. In this approach we think an author can undertake two roles: the meta-authoring role and the authoring role. A...
Aphrodite Tsalgatidou, M. Anastasiou, D. Plevria, ...