One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
We introduce ConcernMapper, an Eclipse plug-in for experimenting with techniques for advanced separation of concerns. ConcernMapper supports development and maintenance tasks invo...
Peer-to-peer sharing systems are becoming increasingly popular and an exciting new class of innovative, internet-based data management systems. In these systems, users contribute ...
Peter Triantafillou, Chryssani Xiruhaki, Manolis K...
Abstract. The aim of this paper is to show how the use of social networks may help users to behave as modelers they trust. Users are guided in this respect within the context of an...