Business processes used in networked business are often large and complex, which makes them difficult to manage and change. In this paper we address this lack of flexibility by pr...
Tim van Eijndhoven, Maria-Eugenia Iacob, Mar&iacut...
Abstract. This paper presents a hybrid agents based architecture that uses casebased reasoning and case-based planning systems as reasoning mechanism in deliberative BDI agents to ...
Dante I. Tapia, Javier Bajo, Juan M. Corchado, Sar...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
In this demonstration, we are going to illustrate how to use a mobile camera to redirect documents to various devices connected to the same network. Categories and Subject Descrip...
Abstract. Today, event logs contain vast amounts of data that can easily overwhelm a human. Therefore, the mining of frequent patterns from event logs is an important system and ne...