The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
We consider the task of driving a remote control car at high speeds through unstructured outdoor environments. We present an approach in which supervised learning is first used to...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...