Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
The availability of intuitive, user-friendly and specialized software to work with 3D models of cultural heritage artifacts is as important as the availability of low-cost and rob...