Abstract. This paper presents the role of meta-modelling and graph transformation in our approach for the modelling, analysis and simulation of complex systems. These are made of c...
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
Abstract. A hybrid workflow system could be treated as a domain-across infrastructure by incorporating different workflow systems and WfMSs engaged in the complex business processi...
Wan-Chun Dou, Shing-Chi Cheung, Guihai Chen, Jie W...
—This paper proposes a framework for determining the correctness and robustness of simulations of hybrid systems. The focus is on simulations generated from model-based design en...
Georgios E. Fainekos, Sriram Sankaranarayanan, Fra...
— In this paper, we develop a theory of computable types suitable for the study of control systems. The theory uses type-two effectivity as the underlying computational model, bu...