With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...
Time is an important data dimension with distinct characteristics that is common across many application domains. This demands specialized methods in order to support proper analy...
Wolfgang Aigner, Alessio Bertone, Silvia Miksch, C...
This paper considers the problem of performing decentralised coordination of low-power embedded devices (as is required within many environmental sensing and surveillance applicat...
Alessandro Farinelli, Alex Rogers, Adrian Petcu, N...
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...