Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
Although companies are more and more developing complex networks of connections with their partners and customers and shifting their focus towards expanding the knowledge manageme...
Our research works are interested in the identification and the representation of the semantic structures of multimedia documents. The semantic structure of a multimedia document ...
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
As part of a National Science Foundation-funded study, we analyze data from a 2002 Midwest urban random sample survey (n = 167 adults) of differential access to and uses of comput...