This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
The New Zealand Digital Library offers several collections of information over the World Wide Web. Although fulltext indexing is the primary access mechanism, musical collections ...
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
ABSTRACT Do developers use proven usability techniques like user involvement, usability testing, and iterative design in industrial practice? Based on inside knowledge of many diff...
In this paper we present a new variation of cultural probes, called Infrastructure Probes (IP). IPs can be seen as an additional ethnographic method to get a deeper understanding ...