We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a...
A social network can become bases for information infrastructure in the future. It is important to extract social networks that are not biased. Providing a simple means for users ...
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...
Large-scale information processing applications must rapidly search through high volume streams of structured and unstructured textual data to locate useful information. Content-ba...
This paper introduces a methodology to help the programmer in the transition from a set of desired global properties expressed as an equation-based model (EBM) that a Multi-Agent ...