Skip to main content
This paper describes key concepts of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several... more
All proposals for quantum key distribution re- quire that the parties have access to an authenticated chan- nel. Therefore, a key pre-distribution system is needed to provide authentication for the users. In this paper we pro- pose an... more
Car navigation systems are discussed in this study in terms of knowledge discovery, data mining and data quality. Since data, information and knowledge are inseparable levels of human cognition, integration of these methods aids to... more
AbstractMore than half a million people in Europe live on chronic renal re-placement therapy by hemodialysis (HD). Though arteriovenous fistulas are the preferred vascular access (VA) method of connecting a patient’s circulation to the... more
Modern C3I systems are best described as semi-automated data management and decision systems over which human operators exercise supervisory control. The effectiveness of such systems is heavily dependent on the design for human-computer... more
Several efforts have already been undertaken to analyse user requirements for Earth observation (EO) data in the marine and coastal environment. However, little has been done to identify the specific requirements for Synthetic Aperture... more
In this paper we present a complete reference framework for the operation of a Trusted Third Party (TTP) as an organisation within a medical environment. The objective is to form an intermediate reference model, to which the TTPs will... more
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference model, to which the CSPs will conform, towards the full... more
Nowadays, more and more surgical interventions are carried out in Minimally Invasive Surgery, to make the post-operative constraints less painful for the patient. Actually, new surgical tools or medical products are designed after... more
Abstract: Daily operation and maintenance tasks are needed to guarantee the correct performance of constructed wetlands. The definition of these activities is a complex task since these actions vary according to the characteristics of... more
Summary Nowadays QoS (Quality of Service) architectures have been required to support most of distributed applications, particularly in wide environments like the Internet. In this context, it aims to be more interesting to offer services... more
Ubiquitous computing environments are intelligent environments that have a wide array of embedded sensors and other artefacts that provide information regarding the current state of the physical environment. Utilisation of such... more
This presentation aims to familiarize the broad audience with the participation of the Bulgarian scientific institutions in the EU SCHEMA Project. SCHEMA is the acronym of Scenarios for Hazard-Induced Emergencies Management - Contract No:... more
Software project scope verification is a very important process in project scope management and it needs to be performed properly so as to avoid project rework and to promote better project scope control. Moreover, software scope... more
SDIs from global to local levels rely on standardization and interoperable GI services. In the GI field, factual standards are those from the Open Geospatial Consortium (OGC). Therefore, the use and further development of OGC standards... more
Today although a contemporary house or apartment is built with new materials according to technology and regulations to provide a satisfactory microclimate within the building, it is difficult to say they are successful comparing with a... more
Debugging data races in parallel applications is a difficult task. Error-causing data races may appear to vanish due to changes in an application's optimization level, thread scheduling, whether or not a debugger is used, and other... more
In multimedia cellular CDMA networks, different receive power levels are set based not only on different user requirements such as data rate and bit error rate but also on interference from other cells - this phenomenon is referred to as... more
The most important part of alarm systems is the rules set that allows triggering alerts. We propose a generic rule design framework which can support the design and the implementation of alerts for drug prescriptions or their... more