Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
If current process management systems shall be applied to a broad spectrum of applications, they will have to be significantly improved with respect to their technological capabili...
Peter Dadam, Manfred Reichert, Stefanie Rinderle, ...
Abstract Nowadays, process oriented software systems, like many business information systems, don't exist only in one single version, but in many variants for better coverage ...
Cross-reactions and other systematic difficulties generated by the coupling of functional chemical subsystems pose the largest challenge for assembling a viable protocell in the la...
Harold Fellermann, Steen Rasmussen, Hans-Joachim Z...
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...