Using ad hoc networks as alternative means of communication in disaster situations is a salutary solution. However, analysing application performance is mandatory for evaluating su...
Various approaches can be used to migrate legacy applications to the Web. In particular, migrating dataintensive legacy applications (e.g. traditional application for business man...
Damiano Distante, Vito Perrone, Mario A. Bochicchi...
Despite experience, many users do not make efficient use of complex computer applications. We argue that this is caused by a lack of strategic knowledge that is difficult to acqui...
Suresh K. Bhavnani, Frederick Reif, Bonnie E. John
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
Technology allows users to interact with a wide variety of information and services. However, more and more users need to integrate complementary content to previously accessed in...