The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...