We have designed and built a set of miniature robots called Scouts and have developed a distributed software system to control them. This paper addresses the fundamental choices we...
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...