Evolving and maintaining software requires adequate documentation of its implementation. However, due to the software's constant evolution, the documentation and implementati...
The conceptual structure of existing software systems is often implicit or non-existing in the source code. We prolightweight abstraction of intentional source-code views as a mea...
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...