: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
Analysis of existing ICT-based solutions for the education of long-term ill children reveal several weaknesses with respect to social and cooperative involvement, cost of developme...
Pieter Jorissen, Fabian Di Fiore, Gert Vansichem, ...
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that...
Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, T...
In this paper we focus on how Quality of Service guarantees are provided to virtualised applications in the Cloud Computing infrastructure that is being developed in the context of...