Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
We present a new conservative image-based occlusion culling method to increase the speed of hardware accelerated rendering of very complex general scenes which may consist of mill...
Heinrich Hey, Robert F. Tobler, Werner Purgathofer
Although conceived for web services, it is shown how BPEL (Business Process Execution Language) can be used to orchestrate a collection of grid services. This is achieved using th...
Service-Oriented Architecture (SOA) plays an important role in the next generation computing models for scientific and commercial applications. But difficulties in the development...