Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
IGW is a software environment for real-time 2D and 3D groundwater modeling. The software functions as a ``numerical laboratory'' in which the modeler can freely explore:...
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
Adaptive multiagent algorithms based upon the behaviour of social insects are powerful decentralised systems capable of solving complex problems. The intelligence of such a system ...