The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
This paper deals with the modelling and evaluation of mission-phased systems devoted to space applications. We propose a two level hierarchical method that allows to model such sy...
In certain real-time applications, ranging from multimedia to telecommunication systems, timing constraints can be more flexible than scheduling theory usually permits. For exampl...
Mobile computing allows ubiquitous and continuousaccess to computing resources while the users travel or work at a client's site. The flexibility introduced by mobile computi...
The conventional independent component regression (ICR), as an exclusive two-step implementation algorithm, has the risk similar to principal component regression (PCR). That is, t...