Providing technology support for older people offers distinct challenges for social and IT systems delivery. The definition and integration of services, the diversity of supply, va...
Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaar...
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Over the last fifteen years, database management systems (DBMSs) have been enhanced by the addition of rule-based programming to obtain active DBMSs. One of the greatest challeng...
Abstract. We do not attempt to provide yet another definition of selforganization, but explore the conditions under which we can model a system as self-organizing. These involve th...
This paper introduces a new programming model for distributed systems, distributed composite objects (DCO), to meet efficient implementation, transparency, and performance demands ...