Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
This paper presents a novel architecture that brings together Information Extraction (IE) with Event Processing (EP) research areas to globally monitor human activities and biodive...
Ahmed Abdeen Hamed, Byung Suk Lee, Anne E. Thessen