The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
Network resources will always be heterogeneous, and thus have different functionalities and programming models. This adversely affects interoperability. Seamless Mobility is one e...
Abstract—Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for largescale distribute...
Alexandra Carpen-Amarie, Jing Cai, Alexandru Costa...
With the development of networking technologies and the advent of the peer-to-peer computing paradigm, distributed file-sharing systems like Gnutella are becoming prevalent over t...
The need for descriptive information, i.e., metadata, about Web resources has been recognized in several application contexts (e.g., digital libraries, portals). The Resource Descr...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...