There are a significant number of proposals for modelling and developing Web Applications, but very few of them state rigorously how to elicit and represent requirements, and how t...
The equivalent kernel [1] is a way of understanding how Gaussian process regression works for large sample sizes based on a continuum limit. In this paper we show how to approximat...
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to archite...
Research into collaborative document use often concentrates on how people share document content. However, studies of real-world document practices reveal that the structures by w...