Abstract. The lack of flexibility is often seen as an inhibitor for the successful application of workflow technology. Many researchers have proposed different ways of addressin...
Wil M. P. van der Aalst, Michael Adams, Arthur H. ...
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
For effective digital rights management (DRM) of multimedia in the framework of embedded systems, both watermarking and cryptography are necessary. In this paper, we present a wat...
Saraju P. Mohanty, Elias Kougianos, Wei Cai, Manis...
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
We introduce the All-Termination(T) problem: given a termination solver, T, and a program (a set of functions), find every set of formal arguments whose consideration is sufficie...