The rise of communicating devices has led to more and more machine to machine applications. In this context devices can be modeled using serviceoriented computing. Furthermore serv...
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
Assuring safety in the home network system (HNS) is a crucial issue to guarantee high quality of life. In this position paper, we first review our previous work, formulating three...
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
The interfaces used by the top Web search engines have changed very little since the early days of Web search. These interfaces follow the traditional model of information retriev...
To characterize the behavior of a mobile ad-hoc network (MANET), the Brownian mobility model is studied, where the random coordinators of mobile nodes are modeled by the Brownian ...