The widespread use of XML brings out the need of ensuring the validity of XML data. The use of languages such as XML Schema makes easier the process of verification of XML documen...
It is introduced a new concept: H-sets which generalises the notion of fuzzy sets and is based on the concept of hemilattice. Then, we extend the attribute-value conceptual spaces ...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Abstract: The design of effective indicators and indicator systems requires a profound understanding of the relevant business context. Numerous relations and dependencies within an...
Ulrich Frank, David Heise, Heiko Kattenstroth, Han...