Application generators have been championed because they can be used to shorten a system’s development cycle and therefore lower its development costs. Application generators ar...
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Many systems require data transformation – the conversion of complex data from one format to another. Most current approaches require programming, scripting bstract visual speci...
Yongqiang Li, John C. Grundy, Robert Amor, John G....
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...