Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
This paper presents a distributed middleware architecture based on a service-oriented approach, to manage high volume sensor events. Event management takes a multi-step operation f...
A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the...
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...