The paper proposes a novel distributed service discovery method for the pervasive computing environment. The method is based on the concept of small world, policy-based advertiseme...
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their seconda...
Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ra...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
- We present an application for analyzing temporal and spatial interaction in an Association Network environment based on integrating Global Positioning Systems (GPS) Data, RDF Met...
David Luper, Delroy Cameron, John Miller, Hamid R....
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...