Pervasive Computing and Smart Applications. -Acting as a Trustee for Internet of Agents in the Absence of Explicit Feedback
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
Privacy Preserving Discovery of Nearby-Friends
AHL: Model-Driven Engineering of BLE Android Applications
Security, Privacy and Trust
Insider threat likelihood assessment for access control systems.-Compliance Verification Algorithm for Computer Systems Security Policies. -Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution
A supervised approach for spam detection using text-based semantic representation. - Process Modeling and Adaptation
Activity-based Process Integration in Healthcare with the User Requirements Notation. -A Business Process Re-Engineering Approach to Transform BPMN Models to Software Artifacts. -Evaluating the Potential of Technology in Justice Systems Using Goal Modeling. - Data Analytics and Machine Learning
An OLAP Rule Environment for Reactive Performance Monitoring. - Supervised Methods to Support Online Triage of Scientific Data
A new Scalable and Performance-enhancing bootstrap Aggregating Scheme for variables selection Taking Real-World Web Services resources as a case. - Toward an adaptive learning framework for MOOCs. - E-Health and E-Commerce. -A Virtual Patient Navigation Application for Lung Cancer Assessment Patients
Responsiveness to Persuasive Strategies at the Workplace: A Case Study. -E-payment plan: A Conditional Multi Payment Scheme based on User Personalization and Plan Agreement. - Reflex-SMAS, a Complex Adaptive System: An Empirical Evaluation.