Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Abstract. We introduce SONAR, a structured overlay to store and retrieve objects addressed by multi-dimensional names (keys). The overlay has the shape of a multi-dimensional torus...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....