Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
In a distributed multi-agent based software environment, the traditional monolithic user model ceases to exist and is replaced by user model fragments, developed by the various so...
The construction of photo-realistic virtual worlds is at reach of current computer graphics. Unfortunately, the philosophy currently adopted for the diffusion of virtual worlds ov...
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
In the information retrieval context, resource collections are frequently classified using thesauri. However, the limited semantics provided by thesauri restricts the collection s...
Javier Lacasta, Javier Nogueras-Iso, Jacques Telle...