Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
According to the current profound development of multimedia and networking technologies, the way people communicate with, naturally, has evolved from a textoriented into a multime...
Y.-J. Kim, Tae-uk Choi, K. O. Jung, Y. K. Kang, Se...
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Decentralized partially observable MDPs (DEC-POMDPs) provide a rich framework for modeling decision making by a team of agents. Despite rapid progress in this area, the limited sc...
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...