The ability to construct dynamic, flexible virtual organizations becomes one of the most desired features of a distributed application system. This paper proposes an agent-mediated...
A major advantage offered by Web services technologies is the ability to dynamically discover and invoke services. This ability is particularly important for operations of many ap...
Arun Mukhija, Andrew Dingwall-Smith, David S. Rose...
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
We propose a hydraulic user interface consisting of an array of spray jets and the appropriate fluid sensing and fluid flow control systems for each jet, so that the device fun...