There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
Continuations, or ’the rest of the computation’, are a concept that is most often used in the context of functional and dynamic programming languages. Implementations of such ...
Analysis of existing ICT-based solutions for the education of long-term ill children reveal several weaknesses with respect to social and cooperative involvement, cost of developme...
Pieter Jorissen, Fabian Di Fiore, Gert Vansichem, ...
By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. Howeve...
Stefanie Rinderle, Ulrich Kreher, Markus Lauer, Pe...
Mobile augmented reality requires accurate alignment of virtual information with objects visible in the real world. We describe a system for mobile communications to be developed ...
Wouter Pasman, Arjen van der Schaaf, Reginald L. L...