The requirement to change scale frequently is common to many 2D and 3D applications. Users must “zoom in” to examine details and “zoom out” to appreciate the context. This...
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
In this paper we present preliminary work implementing dynamic privacy in public surveillance. The aim is to maximise the privacy of those under surveillance, while giving an obse...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
In response to the advance of ubiquitous computing technologies, we believe that for computer systems to be ubiquitous, they must be context-aware. In this paper, we address the i...
Arthur H. van Bunningen, Ling Feng, Peter M. G. Ap...
Abstract. Next-generation Grids will require flexible and adaptive network infrastructures that would be able to provide the requisite quality of service for computational flows....