Across many fields involving complex computing, software systems are being augmented with workflow logging functionality. The log data can be effectively organized using declarativ...
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
This paper reports the results from an action research project which studies the benefits of documenting the evolution and the rationale for the evolution of a requirements specif...
Virtual training systems provide an effective means to train people for complex, dynamic tasks such as crisis management or firefighting. Intelligent agents are often used to pl...
Maaike Harbers, Karel van den Bosch, John-Jules Ch...