Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Due to high data volumes and unpredictable arrival rates, continuous query systems processing expensive queries in real-time may fail to keep up with the input data streams - resul...
Abhishek Mukherji, Elke A. Rundensteiner, Matthew ...
Distributed information retrieval is a well-known approach for accessing heterogeneous, highly autonomous sources of unstructured information. Selecting and querying only a number ...
This paper presents concept of the strategic knowledge resource network for SMEs. A strategic-knowledge resource in a company represents the knowledge, skills and capabilities of t...
The Web Ontology Language (OWL) has been developed and standardised by the World Wide Web Consortium (W3C). It is one of the key technologies underpinning the Semantic Web, but its...
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
In this paper, we consider the challenge of designing a reflective middleware to integrate multiple autonomous simulation models into an integrated simulation environment (multiasi...