The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to mining the organizational setting and interactions among coworkers from workflow logs, we define metrics to establish the relationships among originators by analyzing the information in the workflow logs. Generate relation networks from the workflow logs by applying the handover of work metric. By applying these methods, we can construct the corresponding relation networks which reflects...
Information foraging has gained broad attentions within the cognitive science, computer science and library and information science community in recent years, and its critical ideas have affected these communities a lot. However, few researchers get the basic view of information foraging theory which will blocks this theory's future development. The paper gives a framework for information foraging...
Synchronous dataflow graphs (SDFGs) are widely used to model streaming applications such as signal processing and multimedia applications. These are often implemented on resource-constrained embedded platforms ranging from PDAs and cell phones to automobile equipment and printing systems. Trade-off analysis between resource usage and performance is critical in the life cycle of those products, from...
Trusted Platform Module (TPM) provides the cryptographic functions through the Application Programming Interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage and protect the sensitive information of users, which is stored in the hardware module. But the security of these APIs has not guaranteed. In this paper, a formal model to describe the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.