Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
This paper presents an overview of the DIME environment (DIrect Manipulation Environment) being developed by the author. The paper presents the DIME vision, its catalogue of evolu...
: Presented is the vision of the authors on how diverse web services may be composed, mediated by dynamic task coalitions of agents performing tasks for service requestors. The foc...
The current methods of publishing chemical information in bioscience articles are analysed. Using 3 papers as use-cases, it is shown that conventional methods using human procedur...
Peter Murray-Rust, John B. O. Mitchell, Henry S. R...
Not only the design of complex frameworks is hard, but also the reuse of such artefacts. Furthermore, the internal working of different frameworks is usually not compatible so that...