While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Several advanced applications, such as those dealing with the Web, need to handle data whose structure is not known a-priori. Such requirement severely limits the applicability of ...
The usefulness of online information such as e-publishing and timely notification on the latest scientific or professional news has been widely accepted. However, access to such v...
Soft-device is a promising infrastructure of next-generation distributed system. Soft-devices are configurable and adaptive software virtual mechanism, providing services to each o...
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...