Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
We may view documents, not only as “containers” for information, but also as active participants in organizing and sustaining communities. This paper discusses our experiences...
: We introduce infrastructure monitoring as an application domain that demands decentralized system designs. This is motivated by the large scale of these systems, the heterogeneit...
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
Interactive video technology is meant to support user-interaction with video in scene objects associated with navigation in video segments and access to text-based metadata. Inter...
Rudinei Goularte, Edson dos Santos Moreira, Maria ...