This paper presents a work in progress which deals with the problem of node misbehaviour in ad-hoc networks. A realistic approach is used to determine the impact of contention wind...
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Abstract. Translating XML data into ontologies is the problem of finding an instance of an ontology, given an XML document and a specification of the relationship between the XML...
Transient Web service provisioning implies a variety of different requirements that are hard to meet in traditional Web service environments. Currently, Web service brokerage focus...