Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Many software acquisition projects are doomed to fail due to a lack of integration of acquisition and development processes on the one hand and, because of shortcomings of classic...
Werner Aigner, Peter Regner, Thomas Wiesinger, Jos...
The paper analyses the data collected in 10 schools in Israel which have incorporated ICT in unique ways and have succeeded in devising innovative classroom pedagogies and changes ...
David Mioduser, Rafi Nachmias, D. Tubin, A. Forkos...
In this paper, we study the problem of learning phylogenies and hidden Markov models. We call the Markov model nonsingular if all transtion matrices have determinants bounded away...
In this paper we present an agent-oriented modeling language, called MAS-ML, and an approach for mapping its diagrams into Java implementations. MAS-ML extends the UML meta-model ...
Viviane Torres da Silva, Ricardo Choren, Carlos Jo...