By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
As dialogue systems are widely demanded, the research on natural language generation in dialogue has raised interest. Contrary to conventional dialogue systems that reply to the us...
In this paper we introduce RML, which stands for Rule Markup Language and is used for rule–based transformations of XML. With RML the user can define XML wildcard elements, vari...
Providing technology support for older people offers distinct challenges for social and IT systems delivery. The definition and integration of services, the diversity of supply, va...
Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaar...