We are investigating computational models for humancomputer interaction based on a uniform, declarative, knowledge representation. We describe a new implementation of our work cal...
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
We propose a methodology for automatically realizing communicative goals in graphics. It features a task model that mediates the communicative intent and the selection of graphica...
Stephan M. Kerpedjiev, Giuseppe Carenini, Nancy L....
This paper presents Darwinci, a system that generates new ideas, using a multi-domain knowledge base composed by musical and drawing structures. Its theoretical background comes fr...
An organization is architecturally competent if it has the ability to acquire, use and sustain the skills and knowledge necessary to carry out architecture-related practices that ...
Len Bass, Paul C. Clements, Rick Kazman, Mark Klei...