The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
: This paper briefly summarizes the work towards the final version of ‘Distributed Transaction Processing’ (OSI TP). Several well-known optimizations of the presumed abort prot...
Richard Banks, Peter Furniss, Klaus Heien, Hans-R&...
Many efforts are currently going towards networking smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rat...
Abstract--Today Digital Bibliographies are a powerful instrument that collects a great amount of data about scientific publications. Digital Bibliographies have been used as basis ...
Extensive research activities are recently directed towards the Semantic Web as a future form of the Web. Consequently, Web search as the key technology of the Web is evolving tow...