With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...