Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Context influences the search process, but to date research has not definitively identified which aspects of context are the most influential for information retrieval, and thus a...
Luanne Freund, Elaine G. Toms, Charles L. A. Clark...
To be able to utilize the generative potential of future networks for service composition, the attributes of services and networks must be appropriately formalized, stored and mad...
Abstract. To cope with the ever increasing diversity of markup languages, programming languages, tool kits and interface development environments, conceptual modeling of user inter...