Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree str...
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
The single class best effort service available in the current Internet does not provide the guarantees, typically expressed in terms of minimum bandwidth and/or maximum delay or l...
Selection of Commercial-off-The-Shelf (COTS) software products is a knowledge-intensive process. In this paper, we show how knowledge bases can be used to facilitate the COTS selec...
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...