User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
The actual standards for service authoring, composition and development are not easy to port and to apply for next generation mobile applications. This paper describes some tools ...
Giovanni Bartolomeo, Casalicchio Casalicchio, Stef...
Analysis of blogpost writings is an important and growing research area. Both objective and subjective characteristics of a writer are detected. Words have word meaning that is com...
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest p...
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...