In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
In this article we present an infrastructure for creating mash up and visual representations of the user profile that combine data from different sources. We explored this approach...
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
Last year at the ECDL 2004 conference, we reported some initial progress and experiences developing DSpace as an open source community-driven project [8], particularly as seen from...
Robert Tansley, MacKenzie Smith, Julie Harford Wal...