This paper presents a middleware architecture for the adaptable management of heterogeneous wireless resources. The main application of the proposed architecture is the optimal ut...
Jun-Zhao Sun, Jukka Riekki, Marko Jurmu, Jaakko J....
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Trans-reality role-playing games are conceived of as a form of role-playing game evolving from and integrating established table-top, live-action and computer-based role-playing f...
Abstract We describe the ‘Hierarchical as View’ approach to knowledge integration from heterogeneous sources. This is based on a novel representation called Layered Conceptual ...
Madalina Croitoru, Ernesto Compatangelo, Chris Mel...
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be...