Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Textual-case based reasoning (TCBR) systems where the problem and solution are in free text form are hard to evaluate. In the absence of class information, domain experts are neede...
M. A. Raghunandan, Nirmalie Wiratunga, Sutanu Chak...
Games for learning cannot take the same design approach as games when targeting audiences. While players of entertainment games have the luxury of choosing games that suit them, s...
Brian Magerko, Carrie Heeter, Joe Fitzgerald, Ben ...
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...