Current e-service technology paradigms require the analysis and conceptual modeling of cooperative inter-organizational workflows. Cooperation among different organizations is base...
Most WCET analysis techniques only provide an upper bound on the worst case execution time as a constant value. However, it often appears that the execution time of a piece of cod...
This paper presents a new conceptual framework for summarization that considers the relationship between entities, device properties and user information needs. We summarize using...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
In this paper we introduce a new and simple algorithm to compress isosurface data. This is the data extracted by isosurface algorithms from scalar functions defined on volume gri...