A broader use of e-services for cross enterprise collaboration requires the services to be analysed and designed with a clear business focus. From a business perspective, the e-se...
Martin Henkel, Erik Perjons, Jelena Zdravkovic, Ch...
Multiagent research provides an extensive literature on formal Belief-Desire-Intention (BDI) based models describing the notions of teamwork and cooperation, but adversarial and c...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Abstract - In this paper, an essential oil extraction system with self-refilling system is modeled based on inputoutput data collected from a dedicated acquisition system. The ARMA...
Mohd Hezri Fazalul Rahiman, Mohd Nasir Taib, Yusof...