The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...
The traditional model transformation approach is to write transformation programs in a specialized language. Although such languages provide powerful capabilities to automate mode...
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...