The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
This paper presents recent work on a multimedia retrieval project at Cambridge University and Olivetti Research Limited ORL. We present novel techniques that allow extremely rapid...
M. G. Brown, J. T. Foote, Gareth J. F. Jones, Kare...
Abstract. Nowadays, engineering studies are characterized by high mobility of students, lecturers and workforce and by the dynamics of multinational companies where "classes&q...
Aldo Bongio, Jan van Bruggen, Stefano Ceri, Valent...
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
One of the main tasks of workflow management systems is the coordination of activities in business processes. This paper introduces a solution framework to support adaptive workfl...