Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
With the increasing storage capacity of personal computing devices, the problems of information overload and information fragmentation become apparent on users’ desktops. For the...
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
In this paper we describe the Web 3.0 case study WellnessRules, where ontology-structured rules (including facts) about wellness opportunities are created by participants in rule l...
Harold Boley, Taylor Michael Osmun, Benjamin Larry...
- We describe the architecture, design, and implementation of a VoIP softphone that runs on a bare Intel-386 (or above) based PC. We compare the performance of bare PC and WinRTP s...
Gholam H. Khaksari, Alexander L. Wijesinha, Ramesh...