Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of web serv...
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...