Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
Distributed applications execute in environments that can include different network architectures as well as a range of compute platforms. Furthermore, these resources are shared ...
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Adaptation of distributed software to maintain the best possible application performance in the face of changes in available resources is an increasingly important and complex pro...
David A. Karr, Craig Rodrigues, Joseph P. Loyall, ...
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...