Abstract—We apply automata theory to specifying behavioral interfaces of objects and show how to check schedulability and compatibility of real time asynchronous objects. The beh...
Mohammad Mahdi Jaghoori, Delphine Longuet, Frank S...
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
d Abstract] K. Buchin Dept. Computer Science Utrecht University The Netherlands buchin@cs.uu.nl M. Buchin Dept. Computer Science Utrecht University The Netherlands maike@cs.uu.nl ...