Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
Highly interactive web applications that offer user experience and responsiveness of desktop applications are becoming increasingly popular. They are often composed out of visual...
It is widely accepted that the OO paradigm will signi cantly increase software reusability, extendibility, interoperability, and reliability. This is also true for high assurance ...
David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, C...
Ongoing research in Software Product Line Engineering (SPLE) emphasises the derivation of a concrete product based on a given variant configuration as one of the most promising ar...
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...