In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. To be ...
David Knuplesch, Linh Thao Ly, Stefanie Rinderle-M...
Modern enterprise applications are forced to deal with unreliable, inconsistent and imprecise information. Probabilistic databases can model such data naturally, but SQL query eva...
Social networking sites support a variety of shared content types such as photos, videos, or music. More structured or form-based social content types are not mainstream but we ha...
Werner Geyer, Casey Dugan, Joan Morris DiMicco, Da...
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
The World Wide Web has become pervasive in many facets of our professional and personal lives during the past 10 years. Today, another Internet revolution is emerging: Grid Comput...