-- In this paper we analyze P2P live streaming systems. Through this analysis we obtain the crucial parameters for their performance in terms of bandwidth utilization, set-up time,...
Current database management system technology is unable to provide adequate support for Nomadic Computing. Mobile applications require systems which are sufficiently lightweight an...
By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. Howeve...
Stefanie Rinderle, Ulrich Kreher, Markus Lauer, Pe...
The development of complex scientific applications for high-end systems is a challenging task. Addressing complexity of the involved software and algorithms is becoming increasing...
Manojkumar Krishnan, Yuri Alexeev, Theresa L. Wind...
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...