To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computi...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the...
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...