Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
Web/Gridservices'metadataandsemanticsarebecomingincreasingimportantforservicesharing and effective reuse. In this paper we present a generic framework for engineering and man...
Liming Chen, Nigel R. Shadbolt, Carole A. Goble, F...
Abstract This paper describes efforts to extend educational descriptions of learning objects to enable semantic search for suitable resources held within digital libraries and cybe...
Mark Gahegan, Ritesh Agrawal, Tawan Banchuen, Davi...
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Jun Zhang, Nikos Mam...