Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
Traditional teaching methods have acknowledged limitations. Lectures may be used to transmit information efficiently, but often fail to motivate students to engage with the subjec...
The paper reports on an exploratory case study where an organizational learning methodology was used to support knowledge sharing in a medium-sized distributed software developmen...
Wireless Sensor Networks (WSNs) are distributed systems whose main goal is to collect and deliver data to applications. This paper proposes a reflective, service-oriented middlewa...