Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Abstract. In the business process management community, transformations for process models are usually programmed using imperative languages (such as Java). The underlying mapping ...
In this paper, we present a novel collaborative authoring tool that was designed to allow medical teachers to formalize and visualize their knowledge for medical intelligent tutor...
Siriwan Suebnukarn, Phattanapon Rhienmora, Peter H...
In this paper, we present a novel collaborative authoring tool that was designed to allow medical teachers to formalize and visualize their knowledge for medical intelligent tutor...
Siriwan Suebnukarn, Peter Haddawy, Phattanapon Rhi...
In this paper, we describe a tool to help holistically understand, research and analyze the relationship between an ecosystem model and the relevant laws. Specifically, a software...
Julia A. Ekstrom, Gloria T. Lau, Kincho H. Law, Ma...