Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
A data warehouse DW can be seen as a set of materialized views de ned over remote base relations. When a query is posed, it is evaluated locally, using the materialized views, wi...
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
In this paper we present a new fault tolerant clock synchronization algorithm called the Fault Tolerant Daisy Chain algorithm. It is intended for internal clock synchronization of...