Several applications of graph rewriting systems (notably, some encodings of calculi with name passing) require rules which, besides deleting and generating graph items, are able to...
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
This paper describes cell phone text messaging during the 2004 US Democratic and Republican National Conventions by protesters using TXTmob ? a text-message broadcast system devel...
The autonomic workflow engine enables workflow to be dynamically specified and adapted using Event-Condition-Action rules. A new approach to autonomic execution of workflow process...