Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
It has frequently been observed that most of the world’s data lies outside database systems. The reason is that database systems focus on structured data, leaving the unstructur...
Alon Y. Halevy, Oren Etzioni, AnHai Doan, Zachary ...
We study a collaborative location-based game in which groups of `lions' hunt together on a virtual savannah that is overlaid on an open playing field. The game implements a s...
Steve Benford, Duncan Rowland, Martin Flintham, Ad...
Real-world IP applications such as Peer-to-Peer filesharing are now able to benefit from network and location awareness. It is therefore crucial to understand the relation betwe...
Alexandru Iosup, Pawel Garbacki, Johan A. Pouwelse...