The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Mobile persuasion is using a mobile device to motivate people to change their behavior in a positive way. Thus there is the potential in investigating how mobile technology could ...
Abdullah Al Mahmud, Omar Mubin, Suleman Shahid, Ja...