We introduce a method for the specification of reactive asynchronous components with a concurrent access interface and outline its mathematical foundation. The method supports the...
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Model-based development of highly complex software systems leads to large models. Storing them in repositories offers the possibility to work with these models in a distributed env...
Being the de-facto standard (object-oriented-OO) method(-logy) for software-intensive systems development, UML with its different diagrams and supporting tools represent nowadays t...
The emergence of digital dossiers in Courts of Law presents new opportunities to streamline the criminal prosecution chain. This papers proposes the use of agent technology to sup...
Martijn Warnier, Frances M. T. Brazier, Martin Api...