Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
We extend Tofte and Talpin's region-based model for memory management to support backtracking and cuts, which makes it suitable for use with Prolog and other logic programmin...
International standards for lexicon formats are in preparation. To a certain extent, the proposed formats converge with prior results of standardization projects. However, their a...
— Distributed software environments are increasingly complex and difficult to manage, as they integrate various legacy software with specific management interfaces. Moreover, t...
Laurent Broto, Daniel Hagimont, Estella Annoni, Be...
: This paper sketches an approach to designing organization-specific information models for Enterprise Architecture (EA) Management based on patterns. Thus we intend to support th...
Sabine Buckl, Alexander M. Ernst, Josef Lankes, Ka...