- Full text PDF available (34)
- This year (2)
- Last 5 years (34)
- Last 10 years (81)
Journals and Conferences
For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
Goal-oriented requirements analysis techniques provide ways to refine organizational and technical objectives, to more effectively explore alternatives during requirements definition. After selecting… (More)
To efficiently and effectively mine massive amounts of data in the time series, approximate representation of the data is one of the most commonly used strategies. Piecewise linear approximation is… (More)
This paper describes an approved algorithm for the problems of unequal circle packing – the quasi-physical quasihuman algorithm. First, the quasi-physical approach for the general packing problems is… (More)
The unpredictability of business process requires workflow systems to support workflow monitoring functions with the ability to flexibly adapt to the changing environment. Traditional approaches to… (More)
The Internet is quickly becoming the world’s largest public electronic marketplace. It is estimated to reach 50 million people worldwide, with growth estimates averaging approximately 10% per month.… (More)
Recently, Jadbabaie, Lin, and Morse (IEEE TAC, 48(6)2003:988-1001) offered a mathematical analysis of the discrete time model of groups of mobile autonomous agents raised by Vicsek et al. in 1995. In… (More)
The unpredictability of business activities means that business process management should provide a way to adapt to change. The traditional workflow approach, based on predefined process logic,… (More)
Time and resource management and verification are two important aspects of workflow management systems. In this paper, we present a modeling and analysis approach for a kind of workflow constrained… (More)
Addressing security threats and risks through software quality design factors.