The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Incorporating probabilities into the semantics of incomplete databases has posed many challenges, forcing systems to sacrifice modeling power, scalability, or treatment of relatio...
A prevalent assumption behind interface approaches that employ physical means of interaction is that this leverages users’ prior knowledge from the real world. This paper scruti...
The consistency issues have been well studied in term of methodologies and technologies for the most popular interaction paradigm, namely the client-server. In the agent's wo...
Short time-to-market, easy adaptation to changes in business environment, and robustness of processes are key requirements in today’s business world. In the IT area of Business P...