Much of cognitive psychology focuses on effects measured in tens of milliseconds while significant educational outcomes take tens of hours to achieve. The task of bridging this ga...
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
We propose a small set of parameterized abstract models for workflow patterns, starting from first principles for sequential and distributed control. Appropriate instantiations yie...
The future Web can be imagined as a life network consisting of resource nodes and semantic relationship links between them. Any node has a life span from birth - adding it to the ...
In this paper, we consider a perturbed compound Poisson risk model with two-sided jumps. The downward jumps represent the claims following an arbitrary distribution, while the upw...