Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
This paper describes our experience with developing a product line for middleware-based versioning systems. We perform a detailed domain analysis and define a DSL for configuring i...
: The size and complexity of modern information systems together with requirements for short development time increase the demands for reuse of already existing solutions. The idea...
This paper presents a new method for solving a class of infinite horizon nonlinear optimal control problems. In this method, first the original optimal control problem is transfor...
Application systems often need to react with certain actions whenever some preset conditions are satisfied. In many cases, the evaluation of these conditions takes long time, but...