Modular and flexible software components can be useful for reuse across a class of domain-specific applications or product lines. By varying the composition of components suited t...
M. Brian Blake, Kevin Cleary, Sohan Ranjan, Luis I...
The two most popular backtrack algorithms for solving Constraint Satisfaction Problems (CSPs) are Forward Checking (FC) and Maintaining Arc Consistency (MAC). MAC maintains full ar...
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
An analysis of context-aware user interfaces shows that adaptation mechanisms have a cost-benefit trade-off for usability. Unpredictable autonomous interface adaptations can easil...
Tim F. Paymans, Jasper Lindenberg, Mark A. Neerinc...
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...