WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguiti...
The normalization of a data cube is the process of choosing an ordering for the attribute values, and the chosen ordering will affect the physical storage of the cube’s data. For...
The application of Networked Virtual Environment (NVE) technology on mobile devices is an emerging area in research. The marketing potential for these types of applications, when ...
Peter Quax, Tom Jehaes, Pieter Jorissen, Wim Lamot...