Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...
: Grid Services became a widely used technology for building service oriented applications. The Web Service Resource Framework (WSRF) is the current standard used for building such...
A 3D visual hand gesture recognition method is proposed that detects correctly performed signs from stereo camera input. Hand tracking is based on skin detection with an adaptive ...
Jeroen Lichtenauer, Gineke A. ten Holt, Emile A. H...
Typical computational grid users target only a single cluster and have to estimate the runtime of their jobs. Job schedulers prefer short-running jobs to maintain a high system ut...
Michael Klemm, Matthias Bezold, Stefan Gabriel, Ro...