Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
During last years, the Time-Triggered Architecture (TTA) has been gaining acceptance as a generic architecture for highly dependable real-time systems. It is now being used to imp...
This paper presents a new extension of the DEVS formalism that allows multiple occurrences of a given instance of a DEVS component. This paper is a follow-up to a previous short p...
Olivier Dalle, Bernard P. Zeigler, Gabriel A. Wain...
Given the heterogeneous nature of biological data and their intensive use in many tools, in this paper we propose a semantic data access and integration (DAI) service, based on th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...