Abstract-- This paper considers a recently proposed framework for experiment design in system identification for control. We will consider model based control design methods, such ...
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
The objective of this paper is to describe the use of a probabilistic approach to Web effort estimation by means of a Bayesian Network. A Bayesian Network is a model that embodies ...
- With a trend toward becoming more and more information based, enterprises constantly attempt to surpass the accomplishments of each other by improving their information activitie...
S. Shervin Ostadzadeh, Fereidoon Shams Aliee, S. A...
Due to the lack of a generic platform for location- and spatial-aware systems, many basic services have to be reimplemented in each application that uses spatial-awareness. A coop...
Fritz Hohl, Uwe Kubach, Alexander Leonhardi, Kurt ...