We describe several value-by-area cartogram animation algorithms that can be used to visualize geographically distributed continuous spatiotemporal data that often occur in GIS sy...
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Subdomains of a program's input space are a concept around which ideas about testing can be organized. This paper considers the questions, "What are the best subdomains ...
Autonomy is a quality for devices and creatures that perform tasks with relative independence from their designers and sources of authority. We discuss the idea and present two ca...