Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
Knowledge and knowledge sharing are an important facet of innovative activities. This paper aims to investigate knowledge creation in innovation context and presents the construct...
One of the great benefits that Semantic Web (SW) technology offers is facilitating large scale integration and sharing of distributed data sources. Transferring this technology fro...
Harith Alani, Peter Chandler, Wendy Hall, Kieron O...
This paper focuses on a framework for representing a team plan and its projections on individual agents. The team plan is represented with a coloured Petri net. Using the implicit...