In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
The development of composite Web services is still not as simple as the original vision indicated. Currently, the designer of a composite service needs to consider many different ...
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
The nature of IC design has is necessarily evolving to a more data-centric design flow in which EDA tools share a common information in a design database without the negative cost...