: Service-oriented architectures (SOA) are recent architectures enabling interoperable machine-to-machine process interaction by generating a comprehensive view of independent soft...
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
—WPAN technologies such as IEEE 802.15.4 have been introduced to allow for energy-efficient communication of control and sensor data. In certain application areas, it is benefici...
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is a need for...
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...