In this paper we present results from a six-month empirical study of the high availability aspectsof the CodaFile System. We reporton the servicefailures experienced by Coda clien...
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Hierarchical software components offer interesting characteristics for the development of complex applications. However, supporting the deployment of such applications is difficult...
As a result of globalization, mergers, acquisitions, and scarce skills, software development is increasingly more distributed. Distribution, however, introduces major communicatio...