ct 7 Applying finite-state verification techniques to software systems looks attractive because they are capable of detecting very subtle 8 defects in the logic design of these s...
In this paper, we present a cooperativehypermediabased process support system aimed on
exible business processes. An analysis of the communication, coordination and cooperation r...
To anticipate or not to anticipate -- that is the question, regarding adaptive middleware in the area of ubiquitous computing. Anticipation can guarantee that both the adapted and...
Observing that current Global Similarity Measures (GSM) which average the effect of few significant differences on all dimensions may cause possible performance limitation, we prop...
Zi Huang, Heng Tao Shen, Dawei Song, Xue Li, Stefa...
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...