Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Software agents "living" and acting in a real world software environment, such as an operating system, a network, or a database system, can carry out many tasks for huma...
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
The construction of distributed applications is a challenging task due to inherent system properties like message passing and concurrency. Current technology trends further increas...