Non-traditional environments often change rapidly without forewarning, are difficult or impossible to control, and have other environmental and operational constraints that cannot...
Gisele Bennett, Gitte Lindgaard, Bruce Tsuji, Kay ...
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Many adaptative context-aware middleware exist and mostly rely on so-called vertical architectures that offer a functional decomposition for context-awareness. This architecture ...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...
The current integrated developments in network and computing give rise to a technical infrastructure for the information society which one may variously circumscribe by terms such...
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...