Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
In this article we describe a computational architecture called MC2 that brings together a set of tools that contribute to the knowledge management process by allowing for the cre...
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
—A promising method of automating management tasks in computing systems is to formulate them as control or optimization problems in terms of performance metrics. For an online op...
Requirement traceability is intended to ensure continued alignment between stakeholders’ requirements and various outputs of the system development process. Therefore a process f...
Rosa Candida Pinto, Carla T. L. L. Silva, Jaelson ...