The increasing overall global competition forces requirements for companies to improve their business performance continuously in every sector. The utilization of external resourc...
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Recent gains in energy-efficiency of new-generation NAND flash storage have strengthened the case for in-network storage by data-centric sensor network applications. This paper ...
Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, Pr...
Future networked appliances should be able to download new services or upgrades from the network and execute them locally. This flexibility is typically achieved by processors tha...
Abstract. The following paper describes recent work on NED-2, an intelligent information system for ecosystem management currently in development by the USDA Forest Service. Using ...
Frederick Maier, Donald Nute, Walter D. Potter, Ji...