We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
1 Although ontology has gained wide attention in the area of information systems, a criticism typical of the early days is still rehearsed here and there. Roughly, this criticism s...
This paper presents a novel technique for the modeling, simulation, and analysis of real-time applications on MultiProcessor Systems-on-Chip (MPSoCs). This technique is based on a...
We have many application software today to support reading and writing respectively. However, we believe that few applications available today fully support both reading and writi...
This paper introduces monitoring applications, which we will show differ substantially from conventional business data processing. The fact that a software system must process and...