Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
—A framework for designing a family of novel fast CRC generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optim...
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Many adaptative context-aware middleware exist and mostly rely on so-called vertical architectures that offer a functional decomposition for context-awareness. This architecture ...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...