The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Phonetic string transduction problems, such as letter-to-phoneme conversion and name transliteration, have recently received much attention in the NLP community. In the past few y...
Sittichai Jiampojamarn, Colin Cherry, Grzegorz Kon...
Abstract. We propose a meta-meta framework architecture for supporting the behavior based integration of two business processes. The meta-meta level provides basic integration oper...
Georg Grossmann, Michael Schrefl, Markus Stumptner
Abstract. In this paper, we explore the expressivity of default CG rules (a CGoriented subset of Reiter’s default logics) through two applications. In the first one, we show tha...