—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developer...
This paper describes an integrated model for the realization of an Open and Distance Learning (ODL) environment supporting traditional learning procedures, through collaborative le...
This paper studies five real-world data intensive workflow applications in the fields of natural language processing, astronomy image analysis, and web data analysis. Data intensiv...
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...