Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
—This paper provides a queueing analysis for the slotted Aloha network. We assume the use of an exponential backoff protocol. Most prior work on slotted Aloha focuses on the anal...
The web services technology provides an approach for developing distributed applications by using simple and well defined interfaces. Due to the flexibility of this architecture, ...
Jim Lau, Lau Cheuk Lung, Joni da Silva Fraga, Giul...
Although a huge amount of remote sensing data has been provided by Earth observation satellites, few data manipulation techniques and information extraction in large data sets hav...
Thales Sehn Korting, Leila Maria Garcia Fonseca, M...
Lymphangioleiomyomatosis (LAM) is a multisystem disorder associated with proliferation of smooth muscle-like cells, which leads to destruction of lung parenchyma. Subjective gradi...
Jianhua Yao, Nilo Avila, Andrew Dwyer, Angelo M. T...