With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
— In recent years there have been an increasing number of research groups that have begun to develop multi-chip address-event systems. The communication protocol used to transmit...
Daniel Bernhard Fasnacht, Adrian M. Whatley, Giaco...
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
In general, provenance of electronic data represents an important issue in information systems. So far, Serviceoriented Computing research has mainly focused on provenance of data...
Anton Michlmayr, Florian Rosenberg, Philipp Leitne...