Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
Abstract. We examine to what extent implementation of timed automata can be achieved using the standard semantics and appropriate modeling, instead of introducing new semantics. We...
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
The intensional transformation is a technique that can be used in order to eliminate higher-order functions from a functional program by introducing appropriate context manipulatio...
Electronic marketplaces can provide several types of business processes depending upon their target audience. A form of such processes is electronic auction. It is a system for ac...