An issue that is equally arising both from social networks and the Semantic Web is the fact that, without the consistent use of the same identifier for an object across systems, i...
Stefano Bortoli, Heiko Stoermer, Paolo Bouquet, Ho...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Visual recognition faces the difficult problem of recognizing objects despite the multitude of their appearances. Ample neuroscientific evidence shows that the cortex uses a topogr...
The g-Eclipse framework provides a general, integrated workbench toolset for Grid users, operators and developers. Based on the Open Source Eclipse ecosystem, g-Eclipse supports s...
The Safety Critical Java Specification intends to support the development of programs that must be certified. The specification includes a number of annotations used to constrain ...