The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
As cloud-based computation becomes increasingly important, providing a general computational interface to support datacenterscale programming has become an imperative research age...
Zhiqiang Ma, Zhonghua Sheng, Lin Gu, Liufei Wen, G...
This work addresses conceptual modeling and automatic code generation for Rich Internet Applications, a variant of Web-based systems bridging the gap between desktop and Web inter...
Alessandro Bozzon, Sara Comai, Piero Fraternali, G...
Adaptive Hypermedia Systems (AHS) have long been concentrating on adaptive guidance of links between domain concepts. Here we show parallels between navigation and linking in adap...
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...