Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
As large-scale sensor networks are being deployed with the objective of collecting quality data to support user queries and decision-making, the role of a scalable query model beco...
Abstract—This paper presents a systematic performance analysis of pull P2P video streaming systems for live applications, providing guidelines for the design of the overlay topol...
R. Fortuna, Emilio Leonardi, Marco Mellia, Michela...