Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Abstract. Overload checking, forbidden regions, edge finding, and notfirst/not-last detection are well-known propagation rules to prune the start times of activities which have t...
— Distributed computing systems are increasingly being created as self-organizing collections of many autonomous (human or software) agents cooperating as peers. Peer-to-peer coo...
Computees are abstractions of the entities that populate global and open computing environments. The societies that they populate give an institutional meaning to their interaction...
Marco Alberti, Marco Gavanelli, Evelina Lamma, Pao...
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...