For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
The current implementation of out-of-band control in ATM networks inhibits their successful exploitation. The confusion in signalling protocols between application services and th...
A collaborative multimedia environment allows users to work remotely on common projects by sharing applications (e.g., CAD tools, text editors, white boards) and simultaneously co...
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...