In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
As the ease of accessing and generating large quantities of information increases, people’s ability to navigate through that information and maintain personal perspective decrea...
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Documents in a wide range of genres often contain references to their own sections, pictures etc. We call such referring expressions instances of Document Deixis. The present work ...
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...