Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
This report introduces a hybrid asynchronous, distributed audio/video group conferencing system. One of the chief benefits of Internet communication systems is that they allow com...
James H. Watt, Joseph B. Walther, Kristine L. Nowa...
Abstract. Data in many industrial application systems are often neither completely structured nor unstructured. Consequently semi-structured data models such as XML have become pop...
Fuzzy controllers are designed to work with knowledge in the form of linguistic control rules. But the translation of these linguistic rules into the framework of fuzzy set theory ...