Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
This paper describes a multi-agent system, GraniteNights, modelled on the Agentcities project “evening agent” scenario. GraniteNights allows a user to plan an evening’s enter...
Gunnar Aastrand Grimnes, Stuart Chalmers, Peter Ed...
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...