Conceptual-relational mappings between conceptual models and relational schemas have been used increasingly to achieve interoperability or overcome impedance mismatch in modern dat...
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Information systems must establish trust to cooperate effectively in open environments. We are developing an agent-based approach for establishing trust, where information systems ...
: In information systems that support knowledge-discovery applications such as scientific exploration, reliance on highly structured ontologies as data-organization aids can be lim...
E-blended learning as a new methodology will be explained. E-blended learning scenario for distance learners will include live sessions. During the last years we developed e-learn...