Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Users of multimedia applications today are equipped with a variety of different (mobile) devices that each come with different operating systems, memory and CPU capabilities, netw...
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
Although the OAI-PMH specification is focused on making it straightforward for data providers to expose metadata, practice shows that in certain significant situations deployment ...
Patrick Hochstenbach, Henry N. Jerez, Herbert Van ...