Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Managed Runtime Environments (MREs), such as the JVM and the CLI, form an attractive environment for program execution, by providing portability and safety, via the use of a bytec...
This paper presents a conceptual framework for understanding knowledge integration in distributed networks of practice. The framework builds upon Grant’s knowledge-based theory ...
Abstract. Most of today's business applications have to deal with automated workflows. In this paper, we argue that the blackboard pattern can be used to create an architectur...
Stefan Kleine Stegemann, Burkhardt Funk, Thomas Sl...
Building conversation protocols has traditionally been an art more than a science, as their construction is often guided by designers’ intuition rather than by a principled appro...