In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
In this article the activities of the INEX 2005 Multimedia track are reported. We succesfully realized our objective, to provide an evaluation platform for the evaluation of retrie...
Workflow technology has emerged as an appropriate platform for consolidating the distributed information resources of an enterprise, promoting interoperability across cross-platfo...
ResearchinHumanitiesandSocialSciencesistraditionallybasedonprintedpublicationssuchasmanuscripts, personal correspondence, first editions and other types of documents which are oft...
Michele Nucci, Michele Barbera, Christian Morbidon...