Since tacit knowledge such as know-how and experiences is hard to be managed effectively using information technology, it is recently proposed that providing an appropriate expert...
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal inves...
George H. L. Fletcher, Catharine M. Wyss, Edward L...
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Regis...
Ian T. Foster, Veronika Nefedova, Mehran Ahsant, R...