Distributed applications execute in environments that can include different network architectures as well as a range of compute platforms. Furthermore, these resources are shared ...
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Abstract--End-to-end connectivity is growing increasingly diverse, with orders of magnitude differences in characteristics throughout the network. At the same time, most applicatio...
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
An important activity in the design of a particular database application consists in identifying the integrity constraints that must hold on the database, and that are used to det...
Karla A. V. Borges, Alberto H. F. Laender, Clodove...