This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
This paper proposes a study of the IPTV world, focusing on network and system architectures, video codecs, network protocols, services and quality assurance. Based on this study, a...
Abstract-- It is expected from a Future Internet that a multitude of networks will coexist and complement each other. Such environment allows to run specialized networks possibly p...
Abstract. Experiences with the management of Grid specific monitoring and accounting data have shown that current approaches do not sufficiently support a distinction between prov...