Abstract. This paper presents a framework of specification and verification for distributed real-time object-oriented systems. An earlier paper [17] introduced a process calculus...
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Digital Libraries maintain information lifecycles for the digital objects contained therein. Typically these information lifecycles stipulate that a digital object is deleted at t...
raction of free-standing metadata describing learning objects is typified by an analytical model which primarily focuses on the encoding of discrete properties pertaining to the ...
Abstract. This work introduces a new interaction framework for dynamic virtual environments. The proposed system is designed to deal with all possible interactions in a virtual wor...