Mobile active computational entities introduce peculiar problems in the coordination of distributed application components. The paper surveys several coordination models for mobil...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
In this paper we focus on the problem of making short and medium term forecasts of CPU availability on timeshared Unix systems. We evaluate the accuracy with which availability ca...
We have de ne a network programming model called Mobile Assistant Programming (MAP) for development and execution of communication applications in large scale networks of heteroge...
One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, ...