: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
This paper discusses the use of simulation in a new context. Most often QUEST is viewed as a stand-alone simulation tool to analyze and understand shop floor behavior. It has rare...
The recent explosion in distance learning programs on the world-wide web has spawned a lively debate on the future and the potential of these programs. While distance learning wil...
Design patterns have been widely adopted and well investigated by the software engineering community over the past decade. However, their primary use is still associated with forw...
In this paper we study the interconnection between relationships and roles. We start from the patterns used to introduce relationships in object oriented languages. We show how th...
Matteo Baldoni, Guido Boella, Leendert van der Tor...