Temporal workflow management is important for processes that are time-driven. Claim handling, which requires the documentation, diagnosis, and resolution of customer claims due to...
This paper presents the rst approximation method of the nite-failure set of a logic program by set-based analysis. In a dual view, the method yields a type analysis for programs wi...
Andreas Podelski, Witold Charatonik, Martin Mü...
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Retaining functionality of a mobile robot in the presence of faults is of particular interest in autonomous robotics. From our experiences in robotics we know that hardware is one ...
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...