In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Abstract. The Unified Modelling Language (UML) is intended to describe systems, but it is not clear what systems satisfy a given collection of UML diagrams. Stephen Mellor has desc...
Asynchronous Active Objects (AAOs), primarily exemplied by actors [1], nowadays exist in many forms (various kinds of actors, agents and components) and are more and more used beca...
What will a definitive programming language look like? By definitive language I mean a programming language that gives good soat its level of abstraction, allowing computer science...