In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Damage pre-cursors based health management and prognostication methodology has been presented for electronic systems in harsh environments. The framework has been developed based ...
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
In order to co-ordinate multiple resource providers in grid environment to meet a common objective, support for negotiation is needed to establish a contract between the users and...
Ponnuram Balakrishnan, S. Thamarai Selvi, Gnanapra...