—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Active applications can add value to communication. Yet it involves sophisticated domain knowledge and complex development process. In this paper we discuss a framework for the co...
A major problem in the development of distributed applications is that we cannot assume that the environment in which the application is to operate will remain the same. This mean...
Maarten van Steen, Stefan Van der Zijden, Henk J. ...
This article presents a conceptual framework for the identification and classification of contextual elements included in groupware applications. Contextual elements store informat...