Although initially developed as low-threshold tools to publish on-line, weblogs increasingly appear to facilitate conversations. The objective of this study is to identify practic...
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...
Systems and infrastructures are currently being developed to support Web services and Web processes. One prominent solution to manage and coordinate Web services is the use of wor...