We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminan...
Arie E. Kaufman, Feng Qiu, Haik Lorenz, Jianning W...
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
Projects are the executors of organizational change and hence in charge of the managed evolution of the application landscape in the context of enterprise architecture (EA) managem...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...
Abstract. In this paper we examine the suitability of the Business Process Modelling Notation (BPMN) for business process modelling, using the Workflow Patterns as an evaluation fr...
Petia Wohed, Wil M. P. van der Aalst, Marlon Dumas...