Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
In several working environments, production involves repeated executions of certain procedures. A workflow describes the individual tasks performed in these procedures and their i...
Anastassia Ailamaki, Yannis E. Ioannidis, Miron Li...
Active database systems (ADBS) can, automatically, react to the occurrence of predefined events by definition a collection of active rules. One of the most important modules of AD...
Abbas Rasoolzadegan, Rohollah Alesheykh, Ahmad Abd...
Voluntary Computing systems or Desktop Grids (DGs) enable sharing of commodity computing resources across the globe and have gained tremendous popularity among scientific research...
Many adaptative context-aware middleware exist and mostly rely on so-called vertical architectures that offer a functional decomposition for context-awareness. This architecture ...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...