The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
—When engineering complex software systems, the key Architectural Design Decisions (ADD) and the reasoning underlying those decisions need to be fully understood by all stakehold...
This paper presents an ontological analysis of the EPC (Eventdriven Process Chain) business process modeling notation supported in the ARIS Toolset. This ontological analysis prov...
Modeling and visualization of city scenes is important for many applications including entertainment and urban mission planning. Models covering wide areas can be efficiently cons...
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...