The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
We present various adaptations of the EdgeWrite unistroke text entry method that work on multiple computer input devices: styluses, touchpads, displacement and isometric joysticks...
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...