Most influence networks are depicted as nodes and links operating in the manner of a feed-forward neural network where both nodes and links appear to be homogenous in their nature....
Information technologies enhance efficiency oriented organizational networks and enable creation of expertise oriented professional networks. However, whether IT-enabled efficienc...
Operator procedures are documents telling operators what to do in various situations. They are widely used in process industries including the nuclear power industry. The correctne...
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user...