Keywords, restricted vocabularies (RVs), thesauri, and catalogues are introduced leading up to discussion of the need for full ontologies to describe the full logical and relation...
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Abstract. Recently, there have been a number of proposals for languages for expressing web service constraints and capabilities, with WSPolicy and WSPL leading the way. The propose...
Vladimir Kolovski, Bijan Parsia, Yarden Katz, Jame...
Service-oriented Computing (SoC) in general, and e-service orchestrations in particular have the potential to increase reuse and to ease maintainability. Typically, interoperating ...
Johann Oberleitner, Florian Rosenberg, Schahram Du...
Computing methods that allow the efficient and accurate processing of experimentally gathered data play a crucial role in biological research. The aim of this paper is to present a...