A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under development will satisfy its Quality of Service requireme...
Mobile solutions have gone beyond the role of personal tool to offer solutions in supporting coordinated work. Mobile workers shift constantly from individual to group work, access...
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Abstract. Adaptive process management systems must be able to support changes of single process instances as well as modifications at the process type level and their propagation t...
A fundamental assumption underlying most studies of optical burst switched (OBS) networks is that full wavelength conversion is available throughout the network. In practice, howev...