Effort to evolve and maintain a software system is likely to vary depending on the amount and frequency of change requests. This paper proposes to model change requests as time se...
— Spiking neural networks have been shown capable of simulating sigmoidal artificial neural networks providing promising evidence that they too are universal function approximat...
Silvia Ferrari, Bhavesh Mehta, Gianluca Di Muro, A...
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based o...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
Social networking sites support a variety of shared content types such as photos, videos, or music. More structured or form-based social content types are not mainstream but we ha...
Werner Geyer, Casey Dugan, Joan Morris DiMicco, Da...
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...