This paper gives an overview of recent advances in Real-Time Maude. Real-Time Maude extends the Maude rewriting logic tool to support formal specification and analysis of object-...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
The described dissertation focuses on social regulation of user behavior within virtual social spaces. A multi-year field study of two fantasy-based game MUDs (multi-user dungeons...
The real needs of end users of software technology are often neglected until it is too late. An approach is outlined that puts people before technology, and investigates the real ...
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...