—In disaster areas, office buildings, or at home, multiple autonomous networked mobile robots may act instead of human beings. These robots have to move to their destination so ...
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
—In this paper we present SYNCOBOOK, a distributed system that offers the functionalities of a face-to-face cooperative bookmarking system and of a recommendation system. Our ove...
—Co-located collaboration in classroom is the topic we tackle in this paper. We present COFFEE a tailorable collaborative environment that is designed for interactive, colocated ...
Rosario De Chiara, Antonio Di Matteo, Ilaria Manno...
—Videoconferencing has emerged as a popular method of remote communication. The design of a videoconferencing environment strongly influences the communication efficiency and u...
—Recently, unstructured peer-to-peer (P2P) applications have become extremely popular. Searching in these networks has been a hot research topic. Flooding-based searching, which ...
— While multicast has been studied extensively in many domains such as content streaming and file sharing, there is little research applying it to synchronous collaborations invo...
Abstract—Current authorization solutions take highly case-bycase approaches. First of all, the solutions address particular types of multi-domain collaborations such as Virtual O...
—Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. ...
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...