Abstract. We report on the use of model checking techniques for both the verification of a process control program and the derivation of optimal control schedules. Most of this wor...
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Coordinated multi-point (CoMP) in the cellular uplink appears to be an effective option to combat inter-cell interference, offering large improvements in spectral efficiency and fa...