On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
The functionality that is provided by Mass Storage Systems can be implemented using data grid technology. Data grids already provide many of the required features, including a log...
Michael Wan, Arcot Rajasekar, Reagan Moore, Phil A...
The execution of distributed applications involving mobile terminals and fixed servers connected by wireless links raises the need for handling network disconnections, both invol...
Although k-means clustering is often applied to time series clustering, the underlying Euclidean distance measure is very restrictive in comparison to the human perception of time ...