This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
The paper presents a conceptual solution and an implementation for acquiring, modeling, publishing, retrieving, reusing and maintaining knowledge within XWiki, an open source coll...
Multiplexed image reconstruction, estimating high resolution images from multiple low resolution images with highly overlapped fields of view, is improved when the magnification o...
Sally L. Wood, Hsueh-Ban Lan, Dinesh Rajan, Marc P...
Structured peer-to-peer overlay networks or Distributed Hash Tables (DHTs) are distributed systems optimized for storage and retrieval of read-only data. In this paper we elaborate...
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...