This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
This paper presents three transmission schemes to improve the transmission of MPEG video over a timed token medium access control (MAC) network. Multiple classes of MPEG video are...
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...