Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
In todays increasingly dynamic and competitive business environment, organizations strive to leverage their information resources to gain and sustain competitive advantage. Deci...
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
This paper discusses implementation of the next generation solution for power system control and monitoring. The new design is based on the use of synchronized sampling technology...
Abstract. In [1, 8] we proposed a complete design of a workflow management system using mobile agents. The proposed solution was highly distributed and almost without centralized ...
Zoran Budimac, Mirjana Ivanovic, Aleksandar Popovi...