- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Eliciting requirements for a proposed system inevitably involves the problem of handling undesirable information about customer’s needs, including inconsistency, vagueness, redun...
In Simultaneous Multithreaded (SMT) architectures most hardware resources are shared between threads. This provides a good cost/performance trade-off which renders these architec...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
In this article we defend the idea that social aspects have strong influence in the software requirements elicitation (Goguen 1993), which drive us to find help in the social scien...
Positional ranking functions, widely used in web search engines, improve result quality by exploiting the positions of the query terms within documents. However, it is well known ...