Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
This paper is concerned with remote browsing of JPEG2000 compressed imagery. A potentially interactive client identifies a region and maximum resolution of interest. The server re...
The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications hav...
Alessandro Genco, Antonio Gentile, Cono Ferrarotto...
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...