We claim that automatic multimedia presentation can be modeled by integrating two complementary approaches to automatic design: hierarchical planning to achieve communicative goal...
Stephan M. Kerpedjiev, Giuseppe Carenini, Steven F...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
In this paper we further develop the methodology of temporal logic as an executable imperative language, presented by Moszkowski [Mos86] and Gabbay [Gab87, Gab89] and present a con...
Howard Barringer, Michael Fisher, Dov M. Gabbay, G...
We discuss our study that looks at family members as everyday designers. We explain the design actions of family members to be creative, as evidenced by the resourceful appropriat...
Adaptive websites usually change as effect of user navigational actions. Most current web engineering approaches (which consider personalization) allow to detect basic user browsin...