The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Environmental information systems (EIS) have been in professional use for quite a long time. Applications of this domain often include features of quite common location based servi...
Ari Keronen, Mauri Myllyaho, Pasi Alatalo, Markku ...
Human-Centered Computing (HCC) is a set of methodologies that apply to any field that uses computers, in any form, in applications in which humans directly interact with devices o...
Self-managed software requires monitoring and code changes to an executing program. One technology that enables such self management is software dynamic translation (SDT), which a...
Naveen Kumar, Jonathan Misurda, Bruce R. Childers,...