A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
—Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer ...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...