In this paper we study in-network query processing in disconnected mobile environments, where both ad-hoc communication and infrastructure communication are available. Depending o...
We present the living application, a method to autonomously manage applications on the grid. During its execution on the grid, the living application makes choices on the resources...
XML data can be stored in different databases including ObjectRelational Database (ORDB). Using ORDB, we get the benefit of the relational maturity and the richness of OO modeling...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...