Available methodologies for developing Sematic Web applications do not fully exploit the whole potential deriving from interaction with ontological data sources. Here we introduce...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation ...
Pieter H. Hartel, Leon Abelmann, Mohammed G. Khati...
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
: The goal of this work is to present the software WebRatio 5, which is a good representative of a new generation of CASE tools for model-driven design of Web applications. WebRati...
Roberto Acerbis, Aldo Bongio, Marco Brambilla, Ste...