In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper descri...
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Web services allow authorized entities (including individuals, corporations, and automated agents) to employ software components created by other parties scattered across the glob...
Marcus Fontoura, Tobin J. Lehman, Dwayne Nelson, T...