The CPS transformation dates back to the early 1970's, where it arose as a technique to represent the control flow of programs in -calculus based programming languages as -te...
We describe the process of developing worth maps from field research and initial design sketches for a digital Family Archive, which resulted in a more simple and flexible worth m...
Gilbert Cockton, David S. Kirk, Abigail Sellen, Ri...
Abstract--Reducing energy consumption for high end computing can bring various benefits such as, reduce operating costs, increase system reliability, and environment respect. This ...
Lizhe Wang, Gregor von Laszewski, Jai Dayal, Fugan...
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...