Today, we observe a wide use of geospatial databases that are implemented in many forms (e.g. transactional centralized systems, distributed databases, multidimensional datacubes)....
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Abstract. Geoscience analysis is currently limited by cumbersome access and manipulation of large datasets from remote sources. Due to their data-heavy and compute-light nature, th...
Daniel L. Wang, Charles S. Zender, Stephen F. Jenk...
As current Voice-over-IP (VoIP) systems encourage a direct communication between the callees they are similar in design to peerto-peer (P2P) approaches. Therefore, we introduce a f...