The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide app...
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Ficus is a flexible replication facility with optimistic concurrency control designed to span a wide range of scales and network environments. Optimistic concurrency control provi...
Peter L. Reiher, John S. Heidemann, David Ratner, ...
In general, provenance of electronic data represents an important issue in information systems. So far, Serviceoriented Computing research has mainly focused on provenance of data...
Anton Michlmayr, Florian Rosenberg, Philipp Leitne...