This study tries to apply wireless technologies to build a highly interactive environment. For this purpose, this study first identifies four types of interaction between the memb...
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
—The development and deployment of distributed network-aware applications and services require the ability to compile and maintain a model of the underlying network resources wit...
As energy-related costs have become a major economical factor for IT infrastructures and data-centers, companies and the research community are being challenged to find better an...
This paper provides a report of work in progress to implement integrated access to multiple digital collections that are described using a variety of metadata formats. Using the e...
Karen Calhoun, Tom Turner, Meryl Brodsky, George K...