Abstract: Quality aspects become increasingly important while business process modeling is used in a large-scale enterprise setting. In order to facilitate a storage without redund...
Jan Mendling, Boudewijn F. van Dongen, Wil M. P. v...
The aim of the paper is to give a compositional semantics in the style of the Structural Operational Semantics (SOS) and to study behavioral equivalence notions for P Systems. Fir...
Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo ...
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
We present a novel method for analyzing social behavior. Continuous videos are segmented into action ‘bouts’ by building a temporal context model that combines features from s...
Elaborating on the first stage in the User-Centered Design (UCD) process, understanding the user, this study questions whether it is sufficient to look at the use of interactive s...