Synchronous groupware depends on the assumption that people are fully connected to the others in the group, but there are many situations (network delay, network outage, or explic...
Carl Gutwin, T. C. Nicholas Graham, Christopher Wo...
Middleware for Web service compositions, such as BPEL engines, provides the execution environment for services as well as additional functionalities, such as monitoring and self-t...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
We are concerned with the software implementation of baseband processing for the physical layer of radio standards (“Software Defined Radio - SDR”). Given the constraints for ...
—In this paper, we study the use of IEEE 802.11e for priority based safety messaging for Inter-Vehicle Communications (IVC) in Vehicular Ad-Hoc Networks (VANET). The message prio...