In this work, we introduce the use of tags to support the near synchronous use of instant messaging (IM). As a proof-of-concept, we developed a plug-in in Lotus Sametime, an enter...
Gary Hsieh, Jennifer Lai, Scott E. Hudson, Robert ...
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Decisional systems are crucial for enterprise improvement. They allow the consolidation of heterogeneous data from distributed enterprise data stores into strategic indicators. An...
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifi...