Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
— With the widespread availability of inexpensive broadband Internet connections for home-users, a large number of bandwidth-intensive applications previously not feasible have n...
This paper introduces a software DSM that can extend its shared object space exceeding 4GB in a 32bit commodity cluster environment. This is achieved through the dynamic memory ma...
Abstract. Traditionally, the investment funds market exploits analysis and design concepts based on the procedural programming approach. We propose a set of analysis patterns which...
Applications and digital goods for mobile devices have been around for more than a decade. Recent technology development has also driven the use of mobile commerce technology. Mob...