Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
The increasing amount of communication between individuals in e-formats (e.g. email, Instant messaging and the Web) has motivated computational research in social network analysis...
Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, H...
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Streaming video is a key functionality in Internet based services such as distant education, VoD etc.,. The high bandwidth requirements associated with such applications coupled w...