Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Abstract. We present the main features of a system designed to support the development and delivery of web applications through concepts for modularity, reuse and rapid prototyping...
Web based systems have been shown to be useful tools for supporting educational communication for teachers and students. In this paper we present such a system, which is an Integr...
Abstract. Many methodologies have been introduced to deal with project portfolio selection problem including some techniques that help to evaluate individual projects, or to select...
Data adaptation is an essential system component in a wide variety of application areas. To date, most applications use ad hoc methods to manage data in response to limited resour...