Many technologies and applications have appeared recently which are directed at mobile computing and the wireless Web. Wireless (or mobile) e-commerce is concerned with conducting...
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
While traditional fixed-wired network protocols like 2Phase-Commit guarantee atomicity, we cannot use them in mobile low bandwidth networks where network partitioning, node failu...
Among features often attributed to software agents are autonomy and mobility. Autonomy of e-commerce agents involves adaptability to engage in negotiations governed by mechanisms ...
In an interactive embedded system, special task execution patterns and scheduling constraints exist due to frequent human-computer interactions. This paper proposes a transaction-...