Most direct manipulation tasks rely on precise placements of the cursor on the object of interest. Commonly, this requires the knowledge of distinct application-dependent geometry...
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Taxonomies are an important part of conceptual modeling. They provide substantial structural information, and are typically the key elements in integration eorts, however there ha...
A flexible method to store XML documents in relational or object-relational databases is presented that is based on an adaptable fragmentation. Whereas most known approaches decom...
We present a web system architecture using ontologies to improve the behavior of the system from the performance viewpoint. Since web system performance indexes depend on state an...