Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
: Many information technology (IT) projects fail. These projects are not within budget, not on time or do not deliver what was promised. Failures in IT projects are more common tha...
The emergent nature of structure is a crucial, but often ignored, constraint on authoring hypertexts. VIKI is a spatial hypertext system that supports the emergent s of structure ...
Catherine C. Marshall, Frank M. Shipman III, James...