Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
Maintaining materialized views that have join conditions between arbitrary pairs of data sources possibly with cycles is critical for many applications. In this work, we model vie...
This paper analyses different protocols of session guarantees. Session guarantees (also known as client-centric consistency models) are one of the class of consistency models of r...
Anna Kobusinska, Cezary Sobaniec, Marek Libuda, Da...
The emergence of digital dossiers in Courts of Law presents new opportunities to streamline the criminal prosecution chain. This papers proposes the use of agent technology to sup...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...