This paper sketches the design, and presents a scalability analysis and evaluation of NLS, a scalable naming and location service. NLS resolves textual names to the nearest of a s...
—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time gu...
Ashish Mehra, Jennifer Rexford, Hock-Siong Ang, Fa...
Mobile devices increasingly offer functionality beyond the one provided by traditional resources – processor, memory and applications. This includes, for example, integrated mul...
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
Abstract. Research works and surveys focusing on e-Government Digital Services availability and usage, reveal that often services are available but ignored by citizens. In our hypo...
Flavio Corradini, Damiano Falcioni, Andrea Polini,...