We prove Kleene theorems for two subclasses of labelled product systems which are inspired from well-studied subclasses of 1bounded Petri nets. For product T-systems we define a c...
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
We present data from detailed observations of CityWall, a large multi-touch display installed in a central location in Helsinki, Finland. During eight days of installation, 1199 p...
Peter Peltonen, Esko Kurvinen, Antti Salovaara, Gi...
Building conversation protocols has traditionally been an art more than a science, as their construction is often guided by designers’ intuition rather than by a principled appro...
Configurable business software solutions are increasingly being implemented based on service oriented architectures (SOA). Hereunto model driven approaches for the definition and i...