Current agent-oriented methodologies focus mainly on multi-agent systems analysis and design, but without providing straightforward connections to the implementation of such system...
Abstract: File sharing systems cause a huge portion of traffic in the Internet. With respect to the peer-to-peer approach, unicast delivery of content is the common case. Unfortun...
Many information systems store their objects in a relational database. If the object schema or the relational schema of an application can change often or in an independent way, it...
The configuration of systems engineering methods is a challenging task. As a method engineer it is essential to have conceptual constructs capable of reducing the burden of details...
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...