We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
We present a method to recover scenes deteriorated by superposition of transparent and semi-reflected contributions, as appear in reflections off windows. Separating the superimpo...
This paper focuses on the challenge of building technical agents that act flexibly in modern computing and information environments. Flexibility is approached in terms of both cogn...
With the explosive growth of the Internet, businesses of all sizes aim on applying e-business solutions to their IT infrastructures, migrating their legacy business processes into ...
A business process model represents the basic building block for a workflow-enabled enterprise information system. Generally, a process model evolves through numerous changes durin...