Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Science requires collaboration. In this paper, we investigate the feasibility of coupling current social networking techniques to science gateways to provide a scientific collabor...
One of the main objectives in engineering departments of large industries is the implementation of integrated information systems to manage their projects' life cycle. EnViro...
Ismael H. F. dos Santos, Alberto Barbosa Raposo, L...
The proliferation of electronic content has notably lead to the apparition of large corpora of interrelated structured documents (such as HTML and XML Web pages) and semantic annot...