Nowadays, an increasing number of objects can be represented by their wireless electronic identifiers. For example, people can be recognized by their phone numbers or their phone...
Boying Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Don...
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Abstract. Due to the wide-spread use of decision support systems (DSS), methods are required by software companies. Several concepts and methods have been suggested for decision-ma...
Agile workflow technology deals with business processes that require structural changes during run-time. For the difficult task of adapting the workflows, a modelling language that...
There are many planning applications that require an agent to coordinate its activities with processes that change continuously over time. Several proposals have been made for com...