The trend towards highly specialized solution providers cooperatively offering configurable products and services to their customers requires the extension of current (standalone)...
Alexander Felfernig, Gerhard Friedrich, Dietmar Ja...
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Abstract. State of the art formalisms for distributed ontology integration provide ways to express semantic relations between concepts belonging to different ontologies. However, t...
Video event understanding requires a formalism that can model complex logical temporal and spatial relations between composing sub-events. In this paper we argue that the Petri-Net...
Gal Lavee, Artyom Borzin, Ehud Rivlin, Michael Rud...