Predicting the defects in the next release of a large software system is a very valuable asset for the project manger to plan her resources. In this paper we argue that temporal f...
Abraham Bernstein, Jayalath Ekanayake, Martin Pinz...
In this paper we consider the problem of managing and exploiting schedules in an uncertain and distributed environment. We assume a team of collaborative agents, each responsible ...
Stephen F. Smith, Anthony Gallagher, Terry L. Zimm...
available in the Conference Program). 2007: (with E. Jarmołowicz, Z. Malisz i M. Szczyszek) Gesture, Prosody and Lexicon in ented Dialogues: Progress Report. (Poznań Linguistic M...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...