Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
The paper mainly discusses the DRM-enabled learning object model. Firstly, it analyses the art-of-status of Intellectual Property Rights in e-learning. Secondly, according to appl...
Qingtang Liu, Zongkai Yang, Kun Yan, Jing Jin, Wan...
The inter-operability of multiple autonomous and heterogeneous data sources is an important issue in many applications such as mediation systems, datawarehouses, or web-based syst...
Asynchronous interactions are becoming more and more important in the realization of complex B2B Web applications, and Web services are at the moment the most innovative and well-e...
Marco Brambilla, Giuseppe Guglielmetti, Christina ...
Abstract. Statically estimating the worst case execution time of a program is important for real-time embedded software. This is difficult even in the programming language level du...