Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
Many mixed-reality systems require real-time composition of virtual objects with real video. Such composition requires some description of the virtual and real scene geometries an...
While synchrony and asynchrony are two distinct concepts of concurrency theory, effective and formally defined embedded system design methodologies usually mix the best from both...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Lean manufacturing aims at flexible and efficient manufacturing systems by reducing waste in all forms, such as, production of defective parts, excess inventory, unnecessary proce...
Durk-Jouke van der Zee, Arnout Pool, Jakob Wijngaa...