To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Many important parallel applications require multiple flows of control to run on a single processor. In this paper, we present a study of four flow-of-control mechanisms: proces...
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
In times of disaster acquiring aerial images is challenging. Runways may be crippled thus denying conventional aircraft in the area from taking off. Also the time required to sch...