Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
Abstract. The demand for humanoid robots as service robots for everyday life has increased during the last years. The processing power of the hardware and the development of comple...
The release of WSRF showed that an OGSA infrastructure of stateful WS-Resources could be built on top of plain WSDL, while retaining Web services as stateless entities. This Grid ...
Ramses Rodriguez, Carmen Costilla, Antonio Calleja
Dynamic voltage scaling and sleep state control have been shown to be extremely effective in reducing energy consumption in CMOS circuits. Though plenty of research papers have st...
Razvan Racu, Arne Hamann, Rolf Ernst, Bren Mochock...