This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
We specify and implement a GUI application that simulates marine biological systems by making extensive use of objectoriented design patterns. The key design patterns are model-vi...
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...
Social media are constructed from the collective contributions of potentially millions of individuals and present an increasingly common and large scale form of database. As these...
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...