In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Background: Identifying functional elements, such as transcriptional factor binding sites, is a fundamental step in reconstructing gene regulatory networks and remains a challengi...
Weichun Huang, David M. Umbach, Uwe Ohler, Leping ...
Recent works about the activity-oriented approach et educational modeling languages ask questions about the pedagogical scenario concept. The aim of this paper is to define the fo...
Lesson graphs are composed of Learning Objects (LOs) and include a valuable amount of information about the content and usage of the LOs, described by the LO metadata. Graphs also ...
Olivier Motelet, Nelson Baloian, Benjamin Piwowars...
In this paper we explore the interaction between a dynamic model of the power transmission system (OPA) and a simple economic model of power generation development. Despite the si...
Benjamin A. Carreras, David E. Newman, Matthew Zei...